[go: up one dir, main page]

US12309132B1 - Continuous universal trust architecture and method - Google Patents

Continuous universal trust architecture and method Download PDF

Info

Publication number
US12309132B1
US12309132B1 US18/771,253 US202418771253A US12309132B1 US 12309132 B1 US12309132 B1 US 12309132B1 US 202418771253 A US202418771253 A US 202418771253A US 12309132 B1 US12309132 B1 US 12309132B1
Authority
US
United States
Prior art keywords
entity
authentication
entities
trust
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US18/771,253
Inventor
Nir GAIST
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cortwo Corp
Original Assignee
Cortwo Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cortwo Corp filed Critical Cortwo Corp
Priority to US18/771,253 priority Critical patent/US12309132B1/en
Assigned to Cortwo Corp. reassignment Cortwo Corp. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GAIST, NIR
Assigned to Cortwo Corp. reassignment Cortwo Corp. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GAIST, NIR
Priority to US19/211,829 priority patent/US20260019409A1/en
Application granted granted Critical
Publication of US12309132B1 publication Critical patent/US12309132B1/en
Priority to PCT/US2025/037284 priority patent/WO2026015803A1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/64Routing or path finding of packets in data switching networks using an overlay routing layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Definitions

  • This disclosure relates generally to trust-based network technologies and services.
  • Zero trust security provides network security in which no entity is trusted by default from inside or outside the network. Zero trust solutions work by establishing strong identity verification, validating device compliance prior to granting access, and ensuring least privilege access to only explicitly authorized resources.
  • Continuous trust refers to the notion of trust that develops and/or evolves over time as a result of continuing interactions.
  • a system that provides contextual-based zero trust access may implement context-aware access controls that allow or authenticate access to protected resources after performing risk assessment based on security posture information; a continuous trust evaluation may then be implemented for each of the connected devices, users, and application instances in the operating environment.
  • the system may start with zero trust and gradually increase the trust score of a subject based on analysis of the network data, identity information, and security posture information. The system may then increase or decrease the trust level for the subject based on a risk score determined using the security posture information.
  • a system of this type is described in U.S. Publication No. 2022/0210173.
  • a method for continuous “universal” trust leverages a core network that manages authentication set-up and continuous trust logic for all entities that use the network.
  • the CUT logic is applied to each entity independently, and without requiring authentication to be done directly between entities that desire to communicate with one another.
  • CUT authenticates both user and service independently and separately.
  • the CUT engine applies one or more authentication factors to an entity, once again independently of factors that may be applied by the CUT entity to any other entity that uses the network.
  • the CUT engine continues to authenticate and maintain trust between each entity and the core network, irrespective of the underlying communication to be carried out or occurring between the entities themselves.
  • each of a pair of entities establishes trust through the core network, that trust is retained throughout the communication session that occurs between the pair.
  • the notion of universality as provided for herein means that the trust is retained not just between the pair of entities, but also universally across the core network. Thus, if a first entity independently (and separately from a second entity) has established trust with the core network, this trust is retained and applicable to other communications with the core network.
  • a method of continuous universal trust is carried out in a network operating environment.
  • the method begins by configuring a secure communication path between each of set of first entities, and a second entity, wherein all traffic and data flows between a first entity and the second entity pass through the secure communication path, which in this embodiment corresponds to the core network referenced above.
  • all communications flow through the secure communication path, and each endpoint for a communication (e.g., between a given first entity and the second entity) is authenticated to the core network independently and continuously.
  • each endpoint for a communication e.g., between a given first entity and the second entity
  • the following sub-steps are then carried out.
  • the authentication requirement is specified in a security policy associated with a trust circle, and wherein the set of first entities comprise a trust circle.
  • the first entity is permitted to access the protected resource associated with the second entity via the secure communication path.
  • a determination is then made whether the authentication requirement should be modified e.g., stepped-up, stepped-down, or the like.
  • the authentication requirement is adjusted and then enforced for at least some remaining portion of the communication session.
  • the above-described continuous trust establishment and enforcement is enabled for each of the first entities in the trust circle, and for the second entity, thereby providing for continuous universal trust with respect to all the traffic flows.
  • a computing infrastructure for continuous and universal trust in a network operating environment, including the publicly-routable Internet.
  • one or more first entities desire to obtain access to protected resources associated with one or more second entities.
  • a subset of the first entities may be associated with one another in a trust circle, which is a logical entity over which a security policy is enforced.
  • the infrastructure comprises a core network comprising a relay through which all traffic and data flows between any first entity and any second entity pass, together with a controller, which includes an authentication module, and a continuous trust engine.
  • each first entity and each second entity are independently and separately authenticated to the core network.
  • the controller For each communication session established between a first entity and a second entity, and in this embodiment, the controller is configured to: (i) determine whether an authentication requirement associated with a permitted access to a protected resource associated with the second entity has been met, (ii) upon a determination that the authentication requirement has been met, permitting the first entity to access the protected resource associated with the second entity via the secure communication path; (iii) based on one or more authentication factors and other data, determining whether the authentication requirement should be modified; (iv) upon a determination that the authentication factor should be modified, adjusting the authentication requirement; and (v) enforcing the adjusted authentication requirement for at least some remaining portion of the communication session.
  • the above-described trust circle paradigm is enforced for all interactions of an entity with other entities, such that every entity on the core network is trusted and each entity's trust is universal, rather than being built and managed on a per-interaction or per-service based security model.
  • FIG. 1 depicts a representative continuous universal trust architecture of this disclosure
  • FIG. 2 depicts a visual representation of representative interactions among a user, the core network, and a service provider in the architecture depicted in FIG. 1 .
  • the technique of this disclosure provides for a Continuous Universal Trust (CUT) architecture that enables permitted entities (e.g., users, user groups, machines, devices, applications and the like) to access protected resources (e.g., services, sites, other machines, and the like).
  • the CUT is implemented in a core network positioned as an overlay on the publicly-accessible Internet, and preferably operates in a Software-as-a-Service manner.
  • the core network is physically separated (in effect “air-gapped”) from the public Internet and runs as a separate and distinct network (as opposed to being an overlay), in which case communications to and from core network elements are enabled through an Internet bridge, as will be described further below.
  • the core network may leverage a cloud computing infrastructure, and conceptually the core network sits in-between (as an intermediary) requesting entities and the protected resources (typically provided by third party service providers) that the entities are attempting to interact with.
  • all (or substantially all) traffic intended for the destination entities e.g., third party service providers, machines, or the like
  • the CUT architecture e.g., in an encrypted manner.
  • This routing method and system together with the establishment and maintenance of trust between each entity and the CUT architecture directly (as opposed to between a particular requesting entity, and an associated destination entity), enables the providing of continuous trust, as will be described.
  • the core network components themselves do not have access to the content portions of the traffic due to the encryption or like protection.
  • the term “site” typically refers to a website (or some protected portion thereof), but the reference to a “site” should be broadly construed to refer to any protected resource available from a server or other computing entity.
  • the resource may be the overall site, a service endpoint, a portion of a site, a web service, an application, a web page, a document or other file, another machine or computing device, or a single protected object.
  • the requesting entity is a human being, that entity has an associated mobile or other computing device running one or more mobile applications (or “apps”) including in one embodiment the agent application (“agent”) of this disclosure, as will be described below.
  • an agent is not required.
  • the mobile device may be a smartphone, tablet or wearable, an IOT device or appliance, laptop or the like.
  • the mobile app can be downloaded and installed via a mobile application delivery service, or it may be provided as a native application on the mobile device.
  • the service provider likewise runs a CUT application that is referred to herein as a daemon.
  • Each agent (on the end user client device) or daemon (on the target service provider computing system) typically is implemented in software, e.g., as a program, process, execution thread, or the like.
  • the core network in the CUT comprises one or more trust-based services, each of which is typically implemented as a set of configurable computing resources (e.g. networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services).
  • the service is multi-tenant based, and it is provided on behalf of each service customer (an organization) that desires to enables end users to obtain secure access to the organization's protected resources, which may be hosted on one or more servers that are distinct from the core network (although this is not a limitation).
  • the continuous trust provided by the solution herein typically is implemented as an adjunct to the organization's existing authentication process flow.
  • an end user entity or device has an associated agent (that is a component of the CUT) and that is configured to execute in the user's device at a network interface therein, e.g., a local loopback interface.
  • the agent the user of the device (or service in the case of a web site, IOT device, or any service or business account) registers that device (or other component) with the service, e.g., according to a Know Your Client (KYC) verification (or other identity management) scheme.
  • KYC Know Your Client
  • the particular manner by which the agent is registered to the service may vary and is not a limitation.
  • Each registered user, service or device has an associated CUT Identifier.
  • a typical device includes a browser.
  • the agent has the capability to monitor “ambient” factors that operate in the background and that do not require active user interaction, as well as “active” factors that involve or do require active user interaction (e.g., login operations, user interface interactions, biometrics, data generated as a result of any challenge/response, and the like).
  • ambient factors are quite varied and may include, without limitation, the following: the user's local operating environment including device characteristics, operating system, installed applications, application versions, scripts, and the like, the set of icons on the user's home screen of a mobile application, a set of bookmarks that has been established for a browser, a list of then-running processes on a device, a set of mouse movements generally, and other general or specific user behaviors that are not tied to some prompting, challenge or the like
  • ambient factor data necessarily does not expose personally-identifiable (or the like) information (PII). This locally-captured ambient and active factors data is provided as telemetry to the core network.
  • PII personally-identifiable
  • the Continuous Universal Trust (CUT) architecture is accessible by multiple entities (typically end users, devices, services, enterprises or combinations thereof) that themselves are configured according to a “circle” construct.
  • a “circle” (sometimes referred to as a “trust circle”) refers to a set of entities to which a particular continuous trust policy (or more generally a security policy) is applied by the CUT architecture.
  • a circle may include all of the registered users, users group or other accounts of that enterprise and that are subject to a particular continuous trust policy that will be enforced (in the same manner) for all of the entities that comprise the circle.
  • an end user client entity or any service or other entity participating in CUT, and that registers with the system, has an associated CUT Identifier, and this identifier has one or more profiles, each of which corresponds to a particular circle.
  • a given CUT Identifier may be associated with multiple circles.
  • the notion of trust with respect to the CUT architecture is built upon all interactions of an entity with other entities to provide for a universal trust paradigm.
  • universal trust ensures that every entity on the network can be trusted (a global circle of trust), and each entity's trust is universal (a trust index or score for the entity is global). This trust is facilitated in the preferred embodiment by requiring each entity that operates in association with the CUT architecture to independently and separately authenticate itself to the core network and without regard to an authentication paradigm specific to a particular destination.
  • the notion of universality as provided for herein means that the trust is retained not just between, for example a pair of entities, but also universally across the core network. Thus, if a first entity independently (and separately from a second entity) has established trust with the core network, this trust is retained and applicable to all other communications with the core network.
  • the core network facilitates authentication by the registered entities of a given circle to the protected resources defined by the circle's security policy, as well as enforcing continuous trust.
  • continuous trust is enabled throughout a particular interaction session between a circle's registered user and a target service provider.
  • the core network provides a registered user single sign-on (SSO) or other authentication services to facilitate the user's initial access to a target service provider, and then further enforces a continuous trust paradigm (as defined by the circle's security policy) as the user continues its interactions with the service provider during a session. Throughout this interaction, all traffic flows through the core network, but with all or part of the contents encrypted, as previously described.
  • SSO registered user single sign-on
  • FIG. 1 depicts the CUT architecture in a representative (but non-limiting) embodiment.
  • the end user 100 seeking access to a protected resource associated with a service 102 has an associated agent 104
  • the service provider that provides the service 102 has an associated daemon 106 .
  • An application 101 executing on the end user device is any application functionality that generates a request for a protected resource located at the service 102 .
  • a typical application is a web browser, mobile app, native application code, or the like.
  • the core network 108 (sometime referred to herein as an orchestration layer) comprises a number of components including an authentication factors runtime 110 that receives and manages ambient and active factors data, an engine 112 that uses the authentication factor and other data to manage and control the continuous trust processing, typically according to a circle's security policy, a relay 114 (such as WireguardTM, a secure VPN protocol and tunneling software) through which traffic flows pass, a DNS proxy 116 to facilitate hostname-based access to the continuous trust architecture and to locate services within the core network, together with one or more back-end databases and data stores, and related services.
  • an authentication factors runtime 110 that receives and manages ambient and active factors data
  • an engine 112 that uses the authentication factor and other data to manage and control the continuous trust processing, typically according to a circle's security policy
  • a relay 114 such as WireguardTM, a secure VPN protocol and tunneling software
  • DNS proxy 116 to facilitate hostname-based access to the continuous trust architecture and to locate services within the core network, together with one
  • databases and data stores include, for example: a key-value store 118 that stores authentication data, and a time-series database 120 that stores telemetry extracted from the traffic flows.
  • an SDK 122 (or other such library) is provided to provide or facilitate one or more ancillary functions such as routing service traffic through the core, integrating identity management and other such services with the network, and to facilitate a third party service's leveraging of cores services.
  • the SDK 122 typically is implemented as one or more application programming interfaces (APIs) to which third party service functions are hooked into the core network. Using these services, the SDK associates security profile(s) with circle(s) and their associated registered entities.
  • APIs application programming interfaces
  • the DNS proxy 116 interacts with other Domain Name Services (DNS) on the publicly-routable Internet 124 in a known manner.
  • DNS Domain Name Services
  • hostnames that trigger access to the CUT architecture are received by the DNS proxy 116 (and, as necessary, Internet DNS) to obtain IP addresses of orchestration layer components, such as the relay through which traffic flows.
  • the CUT network itself is distinct from the Internet (as opposed to being an overlay), in which case an Internet bridge 125 is provided to provide a mechanism by which traffic flows enter and exit the core network, which in effect is air-gapped from the public Internet 124 otherwise.
  • An example Internet bridge is a switch, router, proxy (e.g., Hyper), or the like.
  • the end user 100 or the participating service 102 safely interacts (with other entities) on the core network as opposed to the Internet generally, thereby significantly reducing the exposure of the end user or the service to Internet-based threats and attacks. While it is preferred that the end user or service always use the core network, this is not a requirement; for example, the service 102 may interact with the CUT-registered end user 100 over the core network 108 while also interacting with other end users (who are not registered with the core network) directly. In the latter case, a return path (not depicted) is provided from the service (or the daemon) to the public Internet, possibly through the Internet bridge. As also noted above, while in the preferred embodiment all communications with the Internet (by the participating entities) occur through the Internet bridge, this is not required, e.g., when the CUT is configured as an overlay on top of the publicly-routable Internet.
  • a representative relay is a secure VPN tunnel-based solution, such as Wireguard, although this is not a limitation.
  • Wireguard provides a virtual network interface that has a unique public key (pkey) that is used to encrypt or decrypt the traffic at the tunnel endpoints. The pkey can also be used to facilitate validation of user identity, as will be described in further detail below.
  • the traffic (or at least content portions thereof) is secured and delivered end-to-end with IPSec tunnels, HTTP/TCP with custom encryption, firewall-punching protocols (STUN, TURN, etc.) or the like depending on implementation.
  • IPSec IPSec
  • HTTP/TCP HTTP/TCP with custom encryption
  • firewall-punching protocols STUN, TURN, etc.
  • the authentication factors runtime 110 operating in conjunction with the engine 112 , provides initial and continuous authentication of the user or device during a given interaction session with the service provider.
  • module 110 and engine 112 are sometimes referred to as a controller (or continuous trust controller).
  • typically continuous authentication is based on authentication factors that are passed by the agent 104 , such as one or more ambient factors, one or more active factors, or combinations thereof, as well as telemetry 113 extracted from the traffic flow(s).
  • the telemetry 113 is collected as time-series data in the time-series database 120 and provided to the engine 112 for processing according to the security policy provided from the SDK 122 .
  • the agent may be instructed to increase the number of authentication factors that it provides to the authentication module (for evaluation of the entity's continued right to have access), or the daemon may be structured to block the session from proceeding further.
  • the engine is configured to dynamically change a given authentication requirement during an interaction session.
  • a first authentication requirement e.g., weak authentication
  • a second authentication requirement e.g., a somewhat higher authentication
  • the nature and scope of this authentication step-up in this example depends on the policy, the telemetry, and perhaps other factors (e.g., time of day, client location, service load, and others).
  • the engine may then determine to step-up the authentication requirement to an even higher level, e.g., because of the nature or type of follow-on request being made by the client.
  • Another example would be the authentication requirement being stepped-up, but then later returned to a lower authentication requirement. All of these examples are merely illustrative.
  • the engine Upon the initial authentication request, and/or whenever the engine determines that the authentication requirement should change, the engine receives the session, circle and user identifiers (and any associated PKC values), and makes the determination(s) about the nature and type of authentication requirement(s) that are then enforced (or continued to be enforced) by the system for the on-going session. To this end, the engine computes a set of trust indexes (also referred to herein as scores), typically one trust index per authentication factor, and uses this scoring data to determine if, when and to what degree the authentication requirement should be adjusted to maintain the continuous trust.
  • scores typically one trust index per authentication factor
  • a tunnel established between an end user and a service may have an associated unique public key (pkey).
  • FIG. 1 depicts the public key being used.
  • this key may be leveraged to validate user identity. For example, assume that during a particular interaction or session the system determines or reaches a “lower confidence” in the user's identity. At this point, an agent that has access to the pkey can trigger processing of an ambient (or even an active) authentication factor, thus enabling the system to associated identity with the pkey. (As a variant, some other local key may be tied to the user's identity, or a key exchange may be used).
  • the service daemon uses the pkey to both decrypt the traffic and to validate that that the traffic indeed originated from the identity. How the pkey is transmitted to the daemon is implementation-specific.
  • FIG. 2 depicts a typical session among the user and the service provider, with traffic flows through the core.
  • a session typically involves a one or more client requests directed to the service provider service 202 , and one or more responses to the one or more client requests directed to the client (from the service).
  • the UML diagram depicted shows a single request, and an associated response. There is no requirement for a one-to-one correspondence between a request, and a response, or vice-versa.
  • the request originates from application 201 and is intercepted by agent 204 operating on the device's loopback address in the usual case.
  • an encrypted tunnel 226 is or has been established between the agent 204 on the client side, and the daemon 206 on the server-side.
  • the tunnel is associated with a public key (pkey) uniquely associated to the virtual network interface of the tunnel that is associated with the agent-daemon pair. Typically, there is a distinct tunnel per agent-daemon.
  • the agent 204 makes a request to the authentication module 210 , passing a message comprising ⁇ user/pass/src/pkey ⁇ , where “user” is an identifier associated with the user, “pass” is the user's password or other secret, “src” is a source identifier for the client entity (e.g., an IP address), and “pkey” is the tunnel public key.
  • the authentication factors runtime module 210 checks the information against the key-value store (in FIG.
  • the authentication module 210 notifies the agent 204 that the session (here, with the core network) is established.
  • the agent 204 encrypts the original request and forwards the encrypted request, together with source identifier and a destination identifier associated with the service provider, to the relay 214 .
  • the relay 214 provides the engine 212 a message comprising ⁇ src/dest/len/timestamp ⁇ , where “len” is the length in bytes of the encrypted request and associated metadata, and “timestamp” corresponds to a time at which the relay received that encrypted request.
  • the relay 214 forward the encrypted request package (including the “src” and “dest” metadata) to the daemon 206 .
  • the daemon responds by sending the engine 212 a message comprising ⁇ src/pkey/dest/timestamp/request body hash ⁇ , where “request body hash” is a hash value that the daemon has computed over the encrypted request.
  • the request body hash typically is computed using a hash function such as MD5, SHA-1, or the like.
  • the ⁇ id/session ⁇ message is periodically called and cached on the daemon 206 as a keep-alive indication for the session.
  • the daemon 206 which has applied the public key and recovered the request (from the encrypted request), forwards that request to the service 202 in a message comprising ⁇ src/dest/request/id/session ⁇ .
  • the service 202 responds to the daemon 206 with the response to the request. The nature of the response of course will depend on the request.
  • the daemon then re-applies the encryption to the service response using the key to generate an encrypted response.
  • the encrypted response is shown as being returned through the core network to the agent 204 , which in turn removes the encryption and passes the response (in the clear) back to the application 210 . This competes the request-response flow.
  • the engine 212 performs the continuous trust analysis as indicated by the analysis operation at step (12).
  • This is a continuous operation that, as noted above, takes into consideration the policy (circle), the authentication factors (ambient, actual, or combinations), the nature of a given request, the nature of a given response, other system, application or device metadata, and so forth, and that results in one or more control signals that maintain or modify the initial or continuing authentication requirement(s) for the given session, to thereby facilitate the continuous trust.
  • One such control signal is depicted at step (13), as a BLOCK session signal provided by the engine 212 to the daemon 216 . This results (in this example) with a termination of the session.
  • blocking the on-going session from continuing is just one or many possible authentication control options that include: no change, an authentication step-up, an authentication step-down, and combinations.
  • the above-described architecture is configured for multi-tenancy, and is highly-scalable to handle large numbers of requests from large numbers of requesting entities.
  • a continuous universal trust solution is then provided. Because preferably all traffic flows through the core network, and in addition to providing the per-session continuous authentication, the system can readily terminate sessions in the event of a cyber or other attack, and it can readily enforce circle policy compliance. Although it is described that all traffic flows occur through the core network, this may not always be possible, e.g., some video chat applications require peer-to-peer connectivity; in these circumstances, the system may whitelist certain of such applications while enforcing that the remaining traffic to and from a registered end user client and to and from a registered service provider otherwise flow through the network.
  • the system be implemented with an “agent” or a “daemon,” as the functionality of these components may be built into or other integrated with the client or server, as the case may be.
  • An “agent” that allows the system to collect and implement at least the ambient authentication factors greatly improves user experience, as this obviates one or more logins to the participating services.
  • the use of a dedicated agent that hooks into and intercepts potentially the entire traffic profile to and from the end user client enables the system to carry out more detailed behavioral analysis that is then leveraged to provide the continuous authentication. Telemetry data is readily captured as it flows through the infrastructure, all within requiring explicit SDK calls from the service provider.
  • the computing platform or infrastructure that provides the core network is managed and operated “as-a-service” by a service provider entity.
  • the platform is accessible over the publicly-routed Internet at a particular domain, or sub-domain.
  • the platform is a securely-connected infrastructure (typically via SSL/TLS connections), and that infrastructure includes data encrypted at rest, e.g., in an encrypted database, and in transit.
  • the computing platform typically comprises a set of applications implemented as network-accessible services.
  • One or more applications (services) may be combined with one another.
  • An application (service) may be implemented using a set of computing resources that are co-located or themselves distributed.
  • an application is implemented using one or more computing systems.
  • the computing platform (or portions thereof) may be implemented in a dedicated environment, in an on-premises manner, as a cloud-based architecture, or some hybrid.
  • the system may be implemented on-premises (e.g., in an enterprise network), in a cloud computing environment, or in a hybrid infrastructure.
  • An individual end user or an autonomous application typically accesses the system using a user application executing on a computing device (e.g., mobile phone, tablet, laptop or desktop computer, Internet-connected appliance, etc.).
  • a user application is a mobile application (app) that a user obtains from a publicly-available source, such as a mobile application storefront.
  • the platform may be managed and operated by a service provider. Although typically the platform is network-accessible, e.g., via the publicly-routed Internet, the computing system may be implemented in a standalone or on-premises manner.
  • one or more of the identified components may interoperate with some other enterprise computing system or application.
  • Authentication step-up or step-down determinations made by the engine may leverage machine learning.
  • the core network includes a machine learning system.
  • ML Machine Learning
  • the nature and type of Machine Learning (ML) algorithms that are used for determining whether changes to the continuous authentication should be implemented may vary.
  • ML algorithms iteratively learn from the data, thus allowing the system to find hidden insights without being explicitly programmed where to look.
  • ML tasks are typically classified into various categories depending on the nature of the learning signal or feedback available to a learning system, namely supervised learning, unsupervised learning, and reinforcement learning.
  • supervised learning the algorithm trains on labeled historic data and learns general rules that map input to output/target.
  • the discovery of relationships between the input variables and the label/target variable in supervised learning is done with a training set, and the system learns from the training data.
  • a test set is used to evaluate whether the discovered relationships hold and the strength and utility of the predictive relationship is assessed by feeding the model with the input variables of the test data and comparing the label predicted by the model with the actual label of the data.
  • the most widely used supervised learning algorithms are Support Vector Machines, linear regression, logistic regression, naive Bayes, and neural networks.
  • cloud computing is a model of service delivery for enabling on-demand network access to a shared pool of configurable computing resources (e.g. networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services) that can be rapidly provisioned and released with minimal management effort or interaction with a provider of the service.
  • configurable computing resources e.g. networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services
  • SaaS Software as a Service
  • PaaS Platform as a service
  • IaaS Infrastructure as a Service
  • the platform may comprise co-located hardware and software resources, or resources that are physically, logically, virtually and/or geographically distinct.
  • Communication networks used to communicate to and from the platform services may be packet-based, non-packet based, and secure or non-secure, or some combination thereof.
  • a representative machine on which the software executes comprises commodity hardware, an operating system, an application runtime environment, and a set of applications or processes and associated data, which provide the functionality of a given system or subsystem.
  • the functionality may be implemented in a standalone machine, or across a distributed set of machines.
  • a client device is a mobile device, such as a smartphone, tablet, or wearable computing device, laptop or desktop.
  • a typical mobile device comprises a CPU (central processing unit), computer memory, such as RAM, and a drive.
  • the device software includes an operating system (e.g., Google® AndroidTM, or the like), and generic support applications and utilities.
  • the device may also include a graphics processing unit (GPU).
  • the mobile device also includes a touch-sensing device or interface configured to receive input from a user's touch and to send this information to processor.
  • the touch-sensing device typically is a touch screen.
  • the mobile device comprises suitable programming to facilitate gesture-based control, in a manner that is known in the art.
  • the mobile device is any wireless client device, e.g., a cellphone, pager, a personal digital assistant (PDA, e.g., with GPRS NIC), a mobile computer with a smartphone client, network-accessible Internet of Things (IOT) device, or the like.
  • PDA personal digital assistant
  • IOT Internet of Things
  • Other mobile devices in which the technique may be practiced include any access protocol-enabled device (e.g., an AndroidTM-based device, or the like) that is capable of sending and receiving data in a wireless manner using a wireless protocol.
  • Typical wireless protocols are: WiFi, GSM/GPRS, CDMA or WiMax.
  • These protocols implement the ISO/OSI Physical and Data Link layers (Layers 1 & 2 ) upon which a traditional networking stack is built, complete with IP, TCP, SSL/TLS and HTTP.
  • Each above-described process preferably is implemented in computer software as a set of program instructions executable in one or more processors, as a special-purpose machine.
  • This apparatus may be a particular machine that is specially constructed for the required purposes, or it may comprise a computer otherwise selectively activated or reconfigured by a computer program stored in the computer.
  • a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk including an optical disk, a CD-ROM, and a magnetic-optical disk, a read-only memory (ROM), a random access memory (RAM), a magnetic or optical card, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
  • a given implementation of the computing platform is software that executes on a hardware platform running an operating system such as Linux.
  • a machine implementing the techniques herein comprises a hardware processor, and non-transitory computer memory holding computer program instructions that are executed by the processor to perform the above-described methods.
  • the functionality may be implemented with other application layer protocols besides HTTP/HTTPS, or any other protocol having similar operating characteristics.
  • Any computing entity may act as the client or the server.
  • the platform functionality may be co-located or various parts/components may be separately and run as distinct functions, perhaps in one or more locations (over a distributed network).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A method for continuous “universal” trust (CUT) leverages a core network that manages authentication set-up and continuous trust logic for entities that use the network. During communications through the network, and regardless of source or destination, CUT logic is applied to each entity independently, and without requiring authentication to be done directly between entities that desire to communicate with one another. In a typical implementation involving a user and a service, CUT authenticates both user and service independently. To facilitate both initial and continuous authentication, a CUT engine applies authentication factors to an entity, independently of factors that may be applied by the CUT entity to any other entity that uses the network. In this solution, the CUT engine continues to authenticate and maintain trust between each entity and the core network, irrespective of the underlying communication to be carried out or occurring between the entities themselves.

Description

BACKGROUND OF THE INVENTION
This disclosure relates generally to trust-based network technologies and services.
Conventional network security has focused on network perimeter defenses, but many organizations no longer have a clearly-defined network perimeter. Remote work environments and the extensive use of mobile computing devices have dissolved traditional network boundaries. To protect a modern digital enterprise, organizations need a comprehensive strategy for secure access to their corporate resources, regardless of where they are located or how they are configured. To address this need, a security model, known as zero trust, has been developed. Zero trust security provides network security in which no entity is trusted by default from inside or outside the network. Zero trust solutions work by establishing strong identity verification, validating device compliance prior to granting access, and ensuring least privilege access to only explicitly authorized resources.
Current tools and security technologies (e.g., login methods, Multiple Factor Authentication (MFA), CAPTCHA, behavioral-based and other solutions, whether basic or advanced) typically operate to facilitate trust/authentication per specific interaction, or set of interactions (i.e., a session), between a particular source (e.g., a user) and a particular destination (e.g., a service). Common implementations of such solutions, such as gateways, are positioned at or in association with the destination's premises, and they operate to identify and authenticate pre-defined users/connections that are targeting the specific service.
Continuous trust refers to the notion of trust that develops and/or evolves over time as a result of continuing interactions. For example, a system that provides contextual-based zero trust access may implement context-aware access controls that allow or authenticate access to protected resources after performing risk assessment based on security posture information; a continuous trust evaluation may then be implemented for each of the connected devices, users, and application instances in the operating environment. In this approach, the system may start with zero trust and gradually increase the trust score of a subject based on analysis of the network data, identity information, and security posture information. The system may then increase or decrease the trust level for the subject based on a risk score determined using the security posture information. A system of this type is described in U.S. Publication No. 2022/0210173.
While continuous trust solutions provide advantages, typically they are implemented on a per-site basis, and they are designed to operate within or in association with given network domains.
SUMMARY OF THE INVENTION
According to this disclosure, a method for continuous “universal” trust (CUT) leverages a core network that manages authentication set-up and continuous trust logic for all entities that use the network. During all communications through the network (e.g., through a dedicated CUT engine), and regardless of source or destination, the CUT logic is applied to each entity independently, and without requiring authentication to be done directly between entities that desire to communicate with one another. Thus, in a typical implementation involving a user and a service, CUT authenticates both user and service independently and separately. To facilitate both initial and continuous authentication, the CUT engine applies one or more authentication factors to an entity, once again independently of factors that may be applied by the CUT entity to any other entity that uses the network. In this solution, the CUT engine continues to authenticate and maintain trust between each entity and the core network, irrespective of the underlying communication to be carried out or occurring between the entities themselves. Thus, if each of a pair of entities establishes trust through the core network, that trust is retained throughout the communication session that occurs between the pair. Further, the notion of universality as provided for herein means that the trust is retained not just between the pair of entities, but also universally across the core network. Thus, if a first entity independently (and separately from a second entity) has established trust with the core network, this trust is retained and applicable to other communications with the core network.
According to a more specific aspect, a method of continuous universal trust is carried out in a network operating environment. The method begins by configuring a secure communication path between each of set of first entities, and a second entity, wherein all traffic and data flows between a first entity and the second entity pass through the secure communication path, which in this embodiment corresponds to the core network referenced above. As explained, preferably all communications flow through the secure communication path, and each endpoint for a communication (e.g., between a given first entity and the second entity) is authenticated to the core network independently and continuously. During a communication session originating at each first entity and directed to the second entity, the following sub-steps are then carried out. Initially, a determination is made whether an authentication requirement associated with a permitted access to a protected resource has been met. The authentication requirement is specified in a security policy associated with a trust circle, and wherein the set of first entities comprise a trust circle. Upon a determination that the authentication requirement has been met, the first entity is permitted to access the protected resource associated with the second entity via the secure communication path. Based on one or more authentication factors and other data, and while the communication session persists, a determination is then made whether the authentication requirement should be modified (e.g., stepped-up, stepped-down, or the like). Upon a determination that the authentication factor should be modified, the authentication requirement is adjusted and then enforced for at least some remaining portion of the communication session.
Preferably, the above-described continuous trust establishment and enforcement is enabled for each of the first entities in the trust circle, and for the second entity, thereby providing for continuous universal trust with respect to all the traffic flows.
According to another aspect, a computing infrastructure is provided for continuous and universal trust in a network operating environment, including the publicly-routable Internet. In this environment, one or more first entities desire to obtain access to protected resources associated with one or more second entities. A subset of the first entities may be associated with one another in a trust circle, which is a logical entity over which a security policy is enforced. The infrastructure comprises a core network comprising a relay through which all traffic and data flows between any first entity and any second entity pass, together with a controller, which includes an authentication module, and a continuous trust engine. Preferably, each first entity and each second entity are independently and separately authenticated to the core network. For each communication session established between a first entity and a second entity, and in this embodiment, the controller is configured to: (i) determine whether an authentication requirement associated with a permitted access to a protected resource associated with the second entity has been met, (ii) upon a determination that the authentication requirement has been met, permitting the first entity to access the protected resource associated with the second entity via the secure communication path; (iii) based on one or more authentication factors and other data, determining whether the authentication requirement should be modified; (iv) upon a determination that the authentication factor should be modified, adjusting the authentication requirement; and (v) enforcing the adjusted authentication requirement for at least some remaining portion of the communication session.
Generalizing, in a preferred embodiment, the above-described trust circle paradigm is enforced for all interactions of an entity with other entities, such that every entity on the core network is trusted and each entity's trust is universal, rather than being built and managed on a per-interaction or per-service based security model.
BRIEF DESCRIPTION OF DRAWINGS
FIG. 1 depicts a representative continuous universal trust architecture of this disclosure; and
FIG. 2 depicts a visual representation of representative interactions among a user, the core network, and a service provider in the architecture depicted in FIG. 1 .
DETAILED DESCRIPTION OF THE INVENTION
As noted above, the technique of this disclosure provides for a Continuous Universal Trust (CUT) architecture that enables permitted entities (e.g., users, user groups, machines, devices, applications and the like) to access protected resources (e.g., services, sites, other machines, and the like). In one embodiment, the CUT is implemented in a core network positioned as an overlay on the publicly-accessible Internet, and preferably operates in a Software-as-a-Service manner. In a variant embodiment, the core network is physically separated (in effect “air-gapped”) from the public Internet and runs as a separate and distinct network (as opposed to being an overlay), in which case communications to and from core network elements are enabled through an Internet bridge, as will be described further below. In either case, the core network may leverage a cloud computing infrastructure, and conceptually the core network sits in-between (as an intermediary) requesting entities and the protected resources (typically provided by third party service providers) that the entities are attempting to interact with. According to a first aspect of this disclosure, all (or substantially all) traffic intended for the destination entities (e.g., third party service providers, machines, or the like), and typically all responses from the destination entities and intended for the requesting entities, is routed through the CUT architecture, e.g., in an encrypted manner. This routing method and system, together with the establishment and maintenance of trust between each entity and the CUT architecture directly (as opposed to between a particular requesting entity, and an associated destination entity), enables the providing of continuous trust, as will be described. While all traffic is routed through the core in this paradigm, preferably the core network components themselves (including any CUT system operator(s)) do not have access to the content portions of the traffic due to the encryption or like protection.
As used herein, the term “site” typically refers to a website (or some protected portion thereof), but the reference to a “site” should be broadly construed to refer to any protected resource available from a server or other computing entity. The resource may be the overall site, a service endpoint, a portion of a site, a web service, an application, a web page, a document or other file, another machine or computing device, or a single protected object. When the requesting entity is a human being, that entity has an associated mobile or other computing device running one or more mobile applications (or “apps”) including in one embodiment the agent application (“agent”) of this disclosure, as will be described below. In a variant embodiment, an agent is not required. The mobile device may be a smartphone, tablet or wearable, an IOT device or appliance, laptop or the like. The mobile app can be downloaded and installed via a mobile application delivery service, or it may be provided as a native application on the mobile device. Just as the entity seeking the protected resource (at a third party service provider) runs an agent application, the service provider likewise runs a CUT application that is referred to herein as a daemon. Each agent (on the end user client device) or daemon (on the target service provider computing system) typically is implemented in software, e.g., as a program, process, execution thread, or the like.
In another embodiment, a source or requesting entity is a computing machine that runs the agent, and a target or destination entity is a computing machine that runs the daemon. Thus, machine-to-machine interactions through the CUT architecture are also enabled.
In a more specific embodiment, the core network in the CUT comprises one or more trust-based services, each of which is typically implemented as a set of configurable computing resources (e.g. networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services). Typically, the service is multi-tenant based, and it is provided on behalf of each service customer (an organization) that desires to enables end users to obtain secure access to the organization's protected resources, which may be hosted on one or more servers that are distinct from the core network (although this is not a limitation). As will be described, the continuous trust provided by the solution herein typically is implemented as an adjunct to the organization's existing authentication process flow. As noted above, in one embodiment an end user entity or device has an associated agent (that is a component of the CUT) and that is configured to execute in the user's device at a network interface therein, e.g., a local loopback interface. To obtain the agent, the user of the device (or service in the case of a web site, IOT device, or any service or business account) registers that device (or other component) with the service, e.g., according to a Know Your Client (KYC) verification (or other identity management) scheme. The particular manner by which the agent is registered to the service may vary and is not a limitation. Each registered user, service or device has an associated CUT Identifier. A typical device includes a browser. Among other tasks, the agent has the capability to monitor “ambient” factors that operate in the background and that do not require active user interaction, as well as “active” factors that involve or do require active user interaction (e.g., login operations, user interface interactions, biometrics, data generated as a result of any challenge/response, and the like). Representative ambient factors are quite varied and may include, without limitation, the following: the user's local operating environment including device characteristics, operating system, installed applications, application versions, scripts, and the like, the set of icons on the user's home screen of a mobile application, a set of bookmarks that has been established for a browser, a list of then-running processes on a device, a set of mouse movements generally, and other general or specific user behaviors that are not tied to some prompting, challenge or the like To protect privacy, ambient factor data necessarily does not expose personally-identifiable (or the like) information (PII). This locally-captured ambient and active factors data is provided as telemetry to the core network.
According to a further aspect of this disclosure, the Continuous Universal Trust (CUT) architecture is accessible by multiple entities (typically end users, devices, services, enterprises or combinations thereof) that themselves are configured according to a “circle” construct. In this paradigm, a “circle” (sometimes referred to as a “trust circle”) refers to a set of entities to which a particular continuous trust policy (or more generally a security policy) is applied by the CUT architecture. Thus, and for a particular enterprise, a circle may include all of the registered users, users group or other accounts of that enterprise and that are subject to a particular continuous trust policy that will be enforced (in the same manner) for all of the entities that comprise the circle. As noted above, an end user client entity, or any service or other entity participating in CUT, and that registers with the system, has an associated CUT Identifier, and this identifier has one or more profiles, each of which corresponds to a particular circle. A given CUT Identifier may be associated with multiple circles.
Generalizing, and according to a preferred embodiment, the notion of trust with respect to the CUT architecture is built upon all interactions of an entity with other entities to provide for a universal trust paradigm. In this context, universal trust ensures that every entity on the network can be trusted (a global circle of trust), and each entity's trust is universal (a trust index or score for the entity is global). This trust is facilitated in the preferred embodiment by requiring each entity that operates in association with the CUT architecture to independently and separately authenticate itself to the core network and without regard to an authentication paradigm specific to a particular destination. Further, the notion of universality as provided for herein means that the trust is retained not just between, for example a pair of entities, but also universally across the core network. Thus, if a first entity independently (and separately from a second entity) has established trust with the core network, this trust is retained and applicable to all other communications with the core network.
As will be described, and according to a further important benefit herein, the core network facilitates authentication by the registered entities of a given circle to the protected resources defined by the circle's security policy, as well as enforcing continuous trust. Advantageously, and as will be further described, continuous trust is enabled throughout a particular interaction session between a circle's registered user and a target service provider. Thus, in a typical use case, the core network provides a registered user single sign-on (SSO) or other authentication services to facilitate the user's initial access to a target service provider, and then further enforces a continuous trust paradigm (as defined by the circle's security policy) as the user continues its interactions with the service provider during a session. Throughout this interaction, all traffic flows through the core network, but with all or part of the contents encrypted, as previously described.
FIG. 1 depicts the CUT architecture in a representative (but non-limiting) embodiment. In this embodiment, the end user 100 seeking access to a protected resource associated with a service 102 has an associated agent 104, and the service provider that provides the service 102 has an associated daemon 106. An application 101 executing on the end user device is any application functionality that generates a request for a protected resource located at the service 102. A typical application is a web browser, mobile app, native application code, or the like. As shown, the core network 108 (sometime referred to herein as an orchestration layer) comprises a number of components including an authentication factors runtime 110 that receives and manages ambient and active factors data, an engine 112 that uses the authentication factor and other data to manage and control the continuous trust processing, typically according to a circle's security policy, a relay 114 (such as Wireguard™, a secure VPN protocol and tunneling software) through which traffic flows pass, a DNS proxy 116 to facilitate hostname-based access to the continuous trust architecture and to locate services within the core network, together with one or more back-end databases and data stores, and related services. These databases and data stores include, for example: a key-value store 118 that stores authentication data, and a time-series database 120 that stores telemetry extracted from the traffic flows. As also depicted, an SDK 122 (or other such library) is provided to provide or facilitate one or more ancillary functions such as routing service traffic through the core, integrating identity management and other such services with the network, and to facilitate a third party service's leveraging of cores services. The SDK 122 typically is implemented as one or more application programming interfaces (APIs) to which third party service functions are hooked into the core network. Using these services, the SDK associates security profile(s) with circle(s) and their associated registered entities.
In this example embodiment, the DNS proxy 116 interacts with other Domain Name Services (DNS) on the publicly-routable Internet 124 in a known manner. To this end, hostnames that trigger access to the CUT architecture are received by the DNS proxy 116 (and, as necessary, Internet DNS) to obtain IP addresses of orchestration layer components, such as the relay through which traffic flows. In this embodiment, the CUT network itself is distinct from the Internet (as opposed to being an overlay), in which case an Internet bridge 125 is provided to provide a mechanism by which traffic flows enter and exit the core network, which in effect is air-gapped from the public Internet 124 otherwise. An example Internet bridge is a switch, router, proxy (e.g., Hyper), or the like. With this arrangement, the end user 100 or the participating service 102, as the case may be, safely interacts (with other entities) on the core network as opposed to the Internet generally, thereby significantly reducing the exposure of the end user or the service to Internet-based threats and attacks. While it is preferred that the end user or service always use the core network, this is not a requirement; for example, the service 102 may interact with the CUT-registered end user 100 over the core network 108 while also interacting with other end users (who are not registered with the core network) directly. In the latter case, a return path (not depicted) is provided from the service (or the daemon) to the public Internet, possibly through the Internet bridge. As also noted above, while in the preferred embodiment all communications with the Internet (by the participating entities) occur through the Internet bridge, this is not required, e.g., when the CUT is configured as an overlay on top of the publicly-routable Internet.
Referring back to FIG. 1 , and as noted above, preferably all traffic originating from the client side and intended for the server-side, and vice-versa, during a session flows through the core network 108 and, in particular, through the relay 114 that is logically and physically positioned between the agent 104 and the daemon 106. As noted above, a representative relay is a secure VPN tunnel-based solution, such as Wireguard, although this is not a limitation. Wireguard provides a virtual network interface that has a unique public key (pkey) that is used to encrypt or decrypt the traffic at the tunnel endpoints. The pkey can also be used to facilitate validation of user identity, as will be described in further detail below. In an alternative embodiment, the traffic (or at least content portions thereof) is secured and delivered end-to-end with IPSec tunnels, HTTP/TCP with custom encryption, firewall-punching protocols (STUN, TURN, etc.) or the like depending on implementation. Generalizing, the nature and type of traffic that is delivered over end-to-end communication path should be broadly construed as covering any IP-based traffic regardless of the application layer, security wrapper, or the like.
Once again referring back to FIG. 1 , the authentication factors runtime 110, operating in conjunction with the engine 112, provides initial and continuous authentication of the user or device during a given interaction session with the service provider. Together, module 110 and engine 112 are sometimes referred to as a controller (or continuous trust controller). As depicted, and as will be described further below, typically continuous authentication is based on authentication factors that are passed by the agent 104, such as one or more ambient factors, one or more active factors, or combinations thereof, as well as telemetry 113 extracted from the traffic flow(s). The telemetry 113 is collected as time-series data in the time-series database 120 and provided to the engine 112 for processing according to the security policy provided from the SDK 122. As depicted by the arrows, and depending on the determination(s) made by the engine, the agent may be instructed to increase the number of authentication factors that it provides to the authentication module (for evaluation of the entity's continued right to have access), or the daemon may be structured to block the session from proceeding further.
More generally, and based on one or more authentication factors and/or the telemetry, the engine is configured to dynamically change a given authentication requirement during an interaction session. Thus, in one example, at the outset of a workflow, only a first authentication requirement (e.g., weak authentication) is enforced; as the workflow continues, the engine then determines that a second authentication requirement (e.g., a somewhat higher authentication) is then needed, e.g., to ensure continued compliance with the security policy. The nature and scope of this authentication step-up in this example depends on the policy, the telemetry, and perhaps other factors (e.g., time of day, client location, service load, and others). Even later, and as the session continues, the engine may then determine to step-up the authentication requirement to an even higher level, e.g., because of the nature or type of follow-on request being made by the client. This is just a representative example, as the change that occurs to the authentication requirements may be a step-down (a relaxation) of the authentication requirement. Another example would be the authentication requirement being stepped-up, but then later returned to a lower authentication requirement. All of these examples are merely illustrative. Upon the initial authentication request, and/or whenever the engine determines that the authentication requirement should change, the engine receives the session, circle and user identifiers (and any associated PKC values), and makes the determination(s) about the nature and type of authentication requirement(s) that are then enforced (or continued to be enforced) by the system for the on-going session. To this end, the engine computes a set of trust indexes (also referred to herein as scores), typically one trust index per authentication factor, and uses this scoring data to determine if, when and to what degree the authentication requirement should be adjusted to maintain the continuous trust.
As noted above, in one embodiment a tunnel established between an end user and a service may have an associated unique public key (pkey). FIG. 1 depicts the public key being used. In addition to its use for encryption and decryption, this key may be leveraged to validate user identity. For example, assume that during a particular interaction or session the system determines or reaches a “lower confidence” in the user's identity. At this point, an agent that has access to the pkey can trigger processing of an ambient (or even an active) authentication factor, thus enabling the system to associated identity with the pkey. (As a variant, some other local key may be tied to the user's identity, or a key exchange may be used). The service daemon then uses the pkey to both decrypt the traffic and to validate that that the traffic indeed originated from the identity. How the pkey is transmitted to the daemon is implementation-specific.
FIG. 2 depicts a typical session among the user and the service provider, with traffic flows through the core. As used herein, a session typically involves a one or more client requests directed to the service provider service 202, and one or more responses to the one or more client requests directed to the client (from the service). The UML diagram depicted shows a single request, and an associated response. There is no requirement for a one-to-one correspondence between a request, and a response, or vice-versa. In this example, the request originates from application 201 and is intercepted by agent 204 operating on the device's loopback address in the usual case. As depicted, an encrypted tunnel 226 is or has been established between the agent 204 on the client side, and the daemon 206 on the server-side. The tunnel is associated with a public key (pkey) uniquely associated to the virtual network interface of the tunnel that is associated with the agent-daemon pair. Typically, there is a distinct tunnel per agent-daemon. At step (1), the agent 204 makes a request to the authentication module 210, passing a message comprising {user/pass/src/pkey}, where “user” is an identifier associated with the user, “pass” is the user's password or other secret, “src” is a source identifier for the client entity (e.g., an IP address), and “pkey” is the tunnel public key. The authentication factors runtime module 210 checks the information against the key-value store (in FIG. 1 ) and, if the authentication is accepted, forwards a message to the engine 212 at step (2) that comprises {id/session/src/pkey}, wherein “id” refers to the CUT Identifier, and “session” refers to the session. At step (3), the authentication module 210 notifies the agent 204 that the session (here, with the core network) is established. In response, and at step (4), the agent 204 encrypts the original request and forwards the encrypted request, together with source identifier and a destination identifier associated with the service provider, to the relay 214. In response, and at step (5), the relay 214 provides the engine 212 a message comprising {src/dest/len/timestamp}, where “len” is the length in bytes of the encrypted request and associated metadata, and “timestamp” corresponds to a time at which the relay received that encrypted request. At step (6), the relay 214 forward the encrypted request package (including the “src” and “dest” metadata) to the daemon 206. At step (7), the daemon responds by sending the engine 212 a message comprising {src/pkey/dest/timestamp/request body hash}, where “request body hash” is a hash value that the daemon has computed over the encrypted request. The request body hash typically is computed using a hash function such as MD5, SHA-1, or the like. As depicted in step (8), the {id/session}message is periodically called and cached on the daemon 206 as a keep-alive indication for the session.
To complete the request-response flow, at step (9) the daemon 206, which has applied the public key and recovered the request (from the encrypted request), forwards that request to the service 202 in a message comprising {src/dest/request/id/session}. At step (10), the service 202 responds to the daemon 206 with the response to the request. The nature of the response of course will depend on the request. The daemon then re-applies the encryption to the service response using the key to generate an encrypted response. At step (11), the encrypted response is shown as being returned through the core network to the agent 204, which in turn removes the encryption and passes the response (in the clear) back to the application 210. This competes the request-response flow.
As also depicted in FIG. 2 , and during the request-response flow (which as noted above may involve one or more requests, and one or more responses), the engine 212 performs the continuous trust analysis as indicated by the analysis operation at step (12). This is a continuous operation that, as noted above, takes into consideration the policy (circle), the authentication factors (ambient, actual, or combinations), the nature of a given request, the nature of a given response, other system, application or device metadata, and so forth, and that results in one or more control signals that maintain or modify the initial or continuing authentication requirement(s) for the given session, to thereby facilitate the continuous trust. One such control signal is depicted at step (13), as a BLOCK session signal provided by the engine 212 to the daemon 216. This results (in this example) with a termination of the session. As noted above, blocking the on-going session from continuing is just one or many possible authentication control options that include: no change, an authentication step-up, an authentication step-down, and combinations.
As noted, the above-described architecture is configured for multi-tenancy, and is highly-scalable to handle large numbers of requests from large numbers of requesting entities. As the system scales out, a continuous universal trust solution is then provided. Because preferably all traffic flows through the core network, and in addition to providing the per-session continuous authentication, the system can readily terminate sessions in the event of a cyber or other attack, and it can readily enforce circle policy compliance. Although it is described that all traffic flows occur through the core network, this may not always be possible, e.g., some video chat applications require peer-to-peer connectivity; in these circumstances, the system may whitelist certain of such applications while enforcing that the remaining traffic to and from a registered end user client and to and from a registered service provider otherwise flow through the network.
As noted above, it is not required that the system be implemented with an “agent” or a “daemon,” as the functionality of these components may be built into or other integrated with the client or server, as the case may be. An “agent” that allows the system to collect and implement at least the ambient authentication factors greatly improves user experience, as this obviates one or more logins to the participating services. Also, the use of a dedicated agent that hooks into and intercepts potentially the entire traffic profile to and from the end user client enables the system to carry out more detailed behavioral analysis that is then leveraged to provide the continuous authentication. Telemetry data is readily captured as it flows through the infrastructure, all within requiring explicit SDK calls from the service provider.
Enabling Technologies
Typically, the computing platform or infrastructure that provides the core network is managed and operated “as-a-service” by a service provider entity. In one embodiment, the platform is accessible over the publicly-routed Internet at a particular domain, or sub-domain. The platform is a securely-connected infrastructure (typically via SSL/TLS connections), and that infrastructure includes data encrypted at rest, e.g., in an encrypted database, and in transit. The computing platform typically comprises a set of applications implemented as network-accessible services. One or more applications (services) may be combined with one another. An application (service) may be implemented using a set of computing resources that are co-located or themselves distributed. Typically, an application is implemented using one or more computing systems. The computing platform (or portions thereof) may be implemented in a dedicated environment, in an on-premises manner, as a cloud-based architecture, or some hybrid.
The system may be implemented on-premises (e.g., in an enterprise network), in a cloud computing environment, or in a hybrid infrastructure. An individual end user or an autonomous application, typically accesses the system using a user application executing on a computing device (e.g., mobile phone, tablet, laptop or desktop computer, Internet-connected appliance, etc.). In a typical use case, a user application is a mobile application (app) that a user obtains from a publicly-available source, such as a mobile application storefront. The platform may be managed and operated by a service provider. Although typically the platform is network-accessible, e.g., via the publicly-routed Internet, the computing system may be implemented in a standalone or on-premises manner. In addition, one or more of the identified components may interoperate with some other enterprise computing system or application.
Authentication step-up or step-down determinations made by the engine may leverage machine learning. Thus, in a variant embodiment, the core network includes a machine learning system. The nature and type of Machine Learning (ML) algorithms that are used for determining whether changes to the continuous authentication should be implemented may vary. As is known, ML algorithms iteratively learn from the data, thus allowing the system to find hidden insights without being explicitly programmed where to look. ML tasks are typically classified into various categories depending on the nature of the learning signal or feedback available to a learning system, namely supervised learning, unsupervised learning, and reinforcement learning. In supervised learning, the algorithm trains on labeled historic data and learns general rules that map input to output/target. The discovery of relationships between the input variables and the label/target variable in supervised learning is done with a training set, and the system learns from the training data. In this approach, a test set is used to evaluate whether the discovered relationships hold and the strength and utility of the predictive relationship is assessed by feeding the model with the input variables of the test data and comparing the label predicted by the model with the actual label of the data. The most widely used supervised learning algorithms are Support Vector Machines, linear regression, logistic regression, naive Bayes, and neural networks.
One or more functions of the computing platform of this disclosure may be implemented in a cloud-based architecture. As is well-known, cloud computing is a model of service delivery for enabling on-demand network access to a shared pool of configurable computing resources (e.g. networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services) that can be rapidly provisioned and released with minimal management effort or interaction with a provider of the service. Available services models that may be leveraged in whole or in part include: Software as a Service (SaaS) (the provider's applications running on cloud infrastructure); Platform as a service (PaaS) (the customer deploys applications that may be created using provider tools onto the cloud infrastructure); Infrastructure as a Service (IaaS) (customer provisions its own processing, storage, networks and other computing resources and can deploy and run operating systems and applications).
The platform may comprise co-located hardware and software resources, or resources that are physically, logically, virtually and/or geographically distinct. Communication networks used to communicate to and from the platform services may be packet-based, non-packet based, and secure or non-secure, or some combination thereof.
More generally, the techniques described herein are provided using a set of one or more computing-related entities (systems, machines, processes, programs, libraries, functions, or the like) that together facilitate or provide the described functionality described above. In a typical implementation, a representative machine on which the software executes comprises commodity hardware, an operating system, an application runtime environment, and a set of applications or processes and associated data, which provide the functionality of a given system or subsystem. As described, the functionality may be implemented in a standalone machine, or across a distributed set of machines.
Typically, but without limitation, a client device is a mobile device, such as a smartphone, tablet, or wearable computing device, laptop or desktop. A typical mobile device comprises a CPU (central processing unit), computer memory, such as RAM, and a drive. The device software includes an operating system (e.g., Google® Android™, or the like), and generic support applications and utilities. The device may also include a graphics processing unit (GPU). The mobile device also includes a touch-sensing device or interface configured to receive input from a user's touch and to send this information to processor. The touch-sensing device typically is a touch screen. The mobile device comprises suitable programming to facilitate gesture-based control, in a manner that is known in the art.
Generalizing, the mobile device is any wireless client device, e.g., a cellphone, pager, a personal digital assistant (PDA, e.g., with GPRS NIC), a mobile computer with a smartphone client, network-accessible Internet of Things (IOT) device, or the like. Other mobile devices in which the technique may be practiced include any access protocol-enabled device (e.g., an Android™-based device, or the like) that is capable of sending and receiving data in a wireless manner using a wireless protocol. Typical wireless protocols are: WiFi, GSM/GPRS, CDMA or WiMax. These protocols implement the ISO/OSI Physical and Data Link layers (Layers 1 & 2) upon which a traditional networking stack is built, complete with IP, TCP, SSL/TLS and HTTP.
Each above-described process preferably is implemented in computer software as a set of program instructions executable in one or more processors, as a special-purpose machine.
While the above describes a particular order of operations performed by certain embodiments of the invention, it should be understood that such order is exemplary, as alternative embodiments may perform the operations in a different order, combine certain operations, overlap certain operations, or the like. References in the specification to a given embodiment indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic.
While the disclosed subject matter has been described in the context of a method or process, the subject matter also relates to apparatus for performing the operations herein. This apparatus may be a particular machine that is specially constructed for the required purposes, or it may comprise a computer otherwise selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk including an optical disk, a CD-ROM, and a magnetic-optical disk, a read-only memory (ROM), a random access memory (RAM), a magnetic or optical card, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
A given implementation of the computing platform is software that executes on a hardware platform running an operating system such as Linux. A machine implementing the techniques herein comprises a hardware processor, and non-transitory computer memory holding computer program instructions that are executed by the processor to perform the above-described methods.
The functionality may be implemented with other application layer protocols besides HTTP/HTTPS, or any other protocol having similar operating characteristics.
There is no limitation on the type of computing entity that may implement the client-side or server-side of the connection. Any computing entity (system, machine, device, program, process, utility, or the like) may act as the client or the server.
While given components of the system have been described separately, one of ordinary skill will appreciate that some of the functions may be combined or shared in given instructions, program sequences, code portions, and the like. Any application or functionality described herein may be implemented as native code, by providing hooks into another application, by facilitating use of the mechanism as a plug-in, by linking to the mechanism, and the like.
The platform functionality may be co-located or various parts/components may be separately and run as distinct functions, perhaps in one or more locations (over a distributed network).
What is claimed follows below.

Claims (15)

What is claimed is:
1. A method of continuous and universal trust in a network operating environment, comprising:
configuring a secure communication path between each of a set of first entities, and a second entity, wherein each of the set of first entities and the second entity are each authenticated independently and separately from one another and all traffic and data flows between a first entity and the second entity pass through the secure communication path;
during a communication session originating by each first entity and directed to the second entity:
determining whether an authentication requirement associated with a permitted access to a protected resource associated with the second entity has been met, wherein the authentication requirement is specified in a security policy associated with a trust circle, and wherein the set of first entities comprise a trust circle;
upon a determination that the authentication requirement has been met, permitting the first entity to access the protected resource associated with the second entity via the secure communication path;
based on one or more authentication factors and other data, determining whether the authentication requirement should be modified;
upon a determination that the authentication factor should be modified, adjusting the authentication requirement; and
enforcing the adjusted authentication requirement for at least some remaining portion of the communication session;
wherein for, at least first and second first entities, authentication requirements are dynamically adjusted during the communication sessions with the second entity such that the first and second first entities have differing authentication requirements in their respective communication sessions.
2. The method as described in claim 1, wherein the trust circle is associated with a security policy.
3. The method as described in claim 1, further including registering each first entity of the set of first entities in the trust circle.
4. The method as described in claim 1, wherein the authentication factors include one or more ambient authentication factors, one or more active authentication factors, and combinations thereof.
5. The method as described in claim 1, wherein adjusting the authentication requirement is one of: maintaining the authentication requirement, an authentication step-up, and an authentication step-down.
6. The method as described in claim 1, provided as-a-service.
7. The method as described in claim 1, wherein the other data comprises telemetry collected in association with the first entity.
8. The method as described in claim 1, wherein the traffic and data flows include a request for the protected resource, and a response to the request.
9. The method as described in claim 1, wherein the request and the response are encrypted end-to-end through the secure communication path.
10. A computing infrastructure for continuous and universal trust in a network operating environment, comprising:
at least first and second first entities;
a second entity distinct from the at least first and second first entities; and
a core network configured to establish and maintain a secure communication path between the first or second first entity and the second entity, each of the first and second first entities and the second entity authenticated to the core network independently and separately from one another;
the core network comprising a relay through which all traffic and data flows between the first or second first entity and the second entity pass, and a controller, the controller configured for each respective first or second first entity to:
determine whether an authentication requirement associated with a permitted access to a protected resource associated with the second entity has been met, wherein the authentication requirement is specified in a security policy;
upon a determination that the authentication requirement has been met, permitting the respective first or second first entity to access the protected resource associated with the second entity via the secure communication path;
based on one or more authentication factors and other data, determining whether the authentication requirement should be modified;
upon a determination that the authentication factor should be modified, adjusting the authentication requirement; and
enforcing the adjusted authentication requirement for at least some remaining portion of the communication session;
wherein authentication requirements are dynamically adjusted during the communication sessions with the second entity such that the first and second first entities have differing authentication requirements in their respective communication sessions.
11. The computing infrastructure as described in claim 10, wherein the first and second first entities and the second entity are organized in a trust circle associated with the security policy.
12. The computing infrastructure as described in claim 10, wherein the core network is configured as an overlay network in association with the network operating environment.
13. The computing infrastructure as described in claim 10, wherein the core network is configured as a standalone network in association with the network operating environment.
14. The computing infrastructure as described in claim 10, wherein authentication requirements applied to the first first entity different from authentication requirements applied to the second first entity.
15. The computing infrastructure as described in claim 10, wherein an authentication requirement is associated with one of: an ambient authentication factor, an active authentication factor, and a combination of an ambient authentication factor and an active authentication factor.
US18/771,253 2024-07-12 2024-07-12 Continuous universal trust architecture and method Active US12309132B1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US18/771,253 US12309132B1 (en) 2024-07-12 2024-07-12 Continuous universal trust architecture and method
US19/211,829 US20260019409A1 (en) 2024-07-12 2025-05-19 Continuous universal trust architecture and method
PCT/US2025/037284 WO2026015803A1 (en) 2024-07-12 2025-07-11 Continuous universal trust architecture and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US18/771,253 US12309132B1 (en) 2024-07-12 2024-07-12 Continuous universal trust architecture and method

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US19/211,829 Division US20260019409A1 (en) 2024-07-12 2025-05-19 Continuous universal trust architecture and method

Publications (1)

Publication Number Publication Date
US12309132B1 true US12309132B1 (en) 2025-05-20

Family

ID=95717338

Family Applications (1)

Application Number Title Priority Date Filing Date
US18/771,253 Active US12309132B1 (en) 2024-07-12 2024-07-12 Continuous universal trust architecture and method

Country Status (1)

Country Link
US (1) US12309132B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2026015803A1 (en) * 2024-07-12 2026-01-15 Cortwo Corp. Continuous universal trust architecture and method

Citations (183)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040111398A1 (en) * 2002-12-09 2004-06-10 International Business Machines Corporation Performance mechanism for presenting integrated information in a graphical user interface
US20050021964A1 (en) * 2003-07-25 2005-01-27 Bhavna Bhatnagar Method and system for providing a circle of trust on a network
US20070136786A1 (en) * 2005-12-08 2007-06-14 Sun Microsystems, Inc. Enabling identity information exchange between circles of trust
US20070143128A1 (en) * 2005-12-20 2007-06-21 Tokarev Maxim L Method and system for providing customized recommendations to users
US20070180078A1 (en) * 2006-01-30 2007-08-02 Microsoft Corporation Automated File Distribution
US20070297405A1 (en) 2004-12-31 2007-12-27 Liwen He Method of Operating a Network
US20080083021A1 (en) * 2006-10-02 2008-04-03 Presenceid, Inc. Systems and methods for delegating information technology authorization to at least one other person
US20080092223A1 (en) * 2006-10-16 2008-04-17 Aruba Wireless Networks Per-user firewall
US20080130522A1 (en) * 2006-11-30 2008-06-05 Havoc Pennington Protocol for sharing information in a trusted circle using peer to peer methodology
US20080228775A1 (en) * 2007-03-15 2008-09-18 Fatdoor, Inc. Youth communities in a geo-spatial environment
US20080301779A1 (en) * 2007-05-31 2008-12-04 Neeraj Garg Configuring Security Mechanisms Utilizing A Trust System
US20090094041A1 (en) * 2007-10-09 2009-04-09 Novell, Inc. System and method for representing agreements as reputation
US20100071056A1 (en) * 2008-09-18 2010-03-18 Sun Microsystems, Inc. Method and system for multi-protocol single logout
US20100107219A1 (en) * 2008-10-29 2010-04-29 Microsoft Corporation Authentication - circles of trust
US7788700B1 (en) 2002-05-15 2010-08-31 Gerard A. Gagliano Enterprise security system
US20100287600A1 (en) 2009-05-11 2010-11-11 International Business Machines Corporation Assigning User Requests of Different Types or Protocols to a User by Trust Association Interceptors
US7836510B1 (en) * 2004-04-30 2010-11-16 Oracle America, Inc. Fine-grained attribute access control
US7891001B1 (en) 2005-08-26 2011-02-15 Perimeter Internetworking Corporation Methods and apparatus providing security within a network
US20110072274A1 (en) * 2009-03-31 2011-03-24 Topaz Systems, Inc. Distributed system for multi-function secure verifiable signer authentication
US20120042160A1 (en) * 2010-08-10 2012-02-16 General Instrument Corporation System and method for cognizant transport layer security (ctls)
US20120209970A1 (en) 2011-02-15 2012-08-16 Ebay Inc. Systems and methods for facilitating user confidence over a network
US20120232945A1 (en) * 2011-03-10 2012-09-13 Hong Kong R&D Centre for Logistics and Supply Chain Management Enabling Technologies Lightweight privacy protection protocol, methods, and systems for rfid and sensor based logistics track and trace data sharing over business subcontracting relationships
US20120302212A1 (en) * 2011-05-25 2012-11-29 Critical Medical Solutions, Inc. Secure mobile radiology communication system
US20130086669A1 (en) * 2011-09-29 2013-04-04 Oracle International Corporation Mobile application, single sign-on management
US20130091582A1 (en) * 2011-10-08 2013-04-11 Broadcom Corporation Content security in a social network
US20130185772A1 (en) * 2012-01-12 2013-07-18 Aventura Hq, Inc. Dynamically updating a session based on location data from an authentication device
US20130191903A1 (en) * 2012-01-20 2013-07-25 Aventura Hq, Inc. Dual factor authentication with a programmable terminal device
US20130195026A1 (en) * 2012-01-27 2013-08-01 Kerstin Johnsson Centralized control of intra-cell device-to-device communication
US20130205373A1 (en) * 2012-02-08 2013-08-08 Aventura Hq, Inc. Adapting authentication flow based on workflow events
US20130232543A1 (en) * 2012-03-02 2013-09-05 International Business Machines Corporation System and method to provide server control for access to mobile client data
US20130252585A1 (en) * 2006-05-25 2013-09-26 Sean Moshir Systems and methods for encrypted mobile voice communications
US20130311582A1 (en) * 2012-05-18 2013-11-21 University Of Florida Research Foundation, Incorporated Maximizing circle of trust in online social networks
US20130332257A1 (en) * 2012-06-08 2013-12-12 Adobe Systems Incorporated Sharing private devices for content rendering
US20140136349A1 (en) * 2012-11-13 2014-05-15 Apple Inc. Transferring assets
US20140143826A1 (en) * 2012-11-21 2014-05-22 Apple Inc. Policy-based techniques for managing access control
US20140164305A1 (en) * 2012-12-11 2014-06-12 Nuance Communications, Inc. Systems and methods for virtual agent recommendation for multiple persons
US8832848B1 (en) * 2012-07-26 2014-09-09 Symantec Corporation Systems and methods for content-aware access control
US20140282942A1 (en) * 2013-03-15 2014-09-18 Omer BERKMAN Privacy preserving knowledge and factor possession tests for persistent authentication
US20140289528A1 (en) * 2013-03-22 2014-09-25 Davit Baghdasaryan System and method for privacy-enhanced data synchronization
US20140359789A1 (en) * 2013-05-30 2014-12-04 Telecommunication Systems, Inc. Trusted Circle Information Access Management User Interface
US8925053B1 (en) 2012-02-24 2014-12-30 Emc Corporation Internet-accessible service for dynamic authentication and continuous assertion of trust level in identities
US20150072654A1 (en) * 2006-05-25 2015-03-12 Kevin K. Moshir Systems And Methods For Encrypted Mobile Voice Communications
US20150082396A1 (en) * 2013-09-19 2015-03-19 Oracle International Corporation Privileged account plug-in framework - network - connected objects
US9077715B1 (en) * 2006-03-31 2015-07-07 Symantec Corporation Social trust based security model
US20150207813A1 (en) * 2012-02-01 2015-07-23 Vorstack, Inc. Techniques for sharing network security event information
US20150227728A1 (en) * 2014-02-07 2015-08-13 Bank Of America Corporation Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements
US20150227727A1 (en) * 2014-02-07 2015-08-13 Bank Of America Corporation Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location
US9213855B1 (en) * 2014-06-02 2015-12-15 Narus, Inc. Trusted user circles
US20160013966A1 (en) * 2014-07-11 2016-01-14 Microsoft Technology Licensing, Llc Device Circles
US20160028737A1 (en) * 2013-09-20 2016-01-28 Oracle International Corporation Multiple resource servers interacting with single oauth server
US20160055324A1 (en) * 2014-08-20 2016-02-25 Motorola Mobility Llc Context-Based Authentication Mode Selection
US20160135020A1 (en) * 2013-05-20 2016-05-12 Celltrust Corporation System and method for tracking sms messages
US20160373932A1 (en) * 2015-06-19 2016-12-22 Apple Inc. Electronic subscriber identity module management under multiple certificate authorities
US20160373352A1 (en) * 2015-06-17 2016-12-22 Brocade Communications Systems, Inc. Configuration of load-sharing components of a network visibility router in a network visibility system
US9608964B2 (en) * 2015-02-23 2017-03-28 PrivApp, Inc. Private application platform
US20170093899A1 (en) * 2015-09-29 2017-03-30 International Business Machines Corporation Crowd-based detection of device compromise in enterprise setting
US20170093829A1 (en) * 2015-09-25 2017-03-30 Mcafee, Inc. Cumulative authentication for step-up increased authentication factors
US20170111364A1 (en) * 2015-10-14 2017-04-20 Uber Technologies, Inc. Determining fraudulent user accounts using contact information
US20170124506A1 (en) * 2015-10-30 2017-05-04 Zemcar, Inc. Rules Based Driver Selection
US20170171231A1 (en) * 2015-12-11 2017-06-15 Brightpoint Security, Inc. Computer Network Threat Assessment
US20170331826A1 (en) * 2016-05-11 2017-11-16 International Business Machines Corporation Hybrid database access control in external-to-database security systems
US20170346823A1 (en) * 2016-05-25 2017-11-30 Bank Of America Corporation Network of trusted users
US20180012433A1 (en) * 2016-07-07 2018-01-11 NextEv USA, Inc. Vehicle identification or authentication
US20180077745A1 (en) * 2015-04-15 2018-03-15 Nec Corporation Method for coordinating terminal-to-terminal communication via ad-hoc network and mobile communication network, and management server device in which said method is implemented
WO2018069566A1 (en) * 2016-10-14 2018-04-19 Nokia Technologies Oy Method, device and system for validating sensitive user data transactions within trusted circle
US20180121646A1 (en) * 2016-11-01 2018-05-03 Ricoh Company, Ltd. Information processing device, information processing system, and information processing method
US20180131692A1 (en) * 2016-11-09 2018-05-10 Idefend Ltd. System and a method for applying dynamically configurable means of user authentication
US20180129797A1 (en) * 2016-11-10 2018-05-10 EyeVerify Inc. Verified and private portable identity
US20180150890A1 (en) * 2016-11-28 2018-05-31 Sap Se Trust circle through machine learning
US20180191501A1 (en) * 2016-12-31 2018-07-05 Nok Nok Labs, Inc. System and method for sharing keys across authenticators
US20180278600A1 (en) * 2016-01-19 2018-09-27 Regwez, Inc. Multi-factor masked access control system
US10110569B1 (en) * 2015-04-08 2018-10-23 CSuite Technologies, Inc. Systems and methods of storing data on a cloud-based personal virtual server
US20180309570A1 (en) 2017-04-21 2018-10-25 Netgear, Inc. Secure communication in network access points
US20180324197A1 (en) * 2017-05-03 2018-11-08 Servicenow, Inc. Aggregating network security data for export
US20180324207A1 (en) * 2017-05-05 2018-11-08 Servicenow, Inc. Network security threat intelligence sharing
US20180332065A1 (en) * 2017-05-11 2018-11-15 International Business Machines Corporation Authenticating an unknown device based on relationships with other devices in a group of devices
US20180332017A1 (en) * 2017-05-11 2018-11-15 International Business Machines Corporation Authenticating a device based on communication patterns in a group of devices
US20180337911A1 (en) * 2017-05-16 2018-11-22 Apple Inc. Techniques for verifying user intent and securely configuring computing devices
US10164982B1 (en) * 2017-11-28 2018-12-25 Cyberark Software Ltd. Actively identifying and neutralizing network hot spots
US20190013948A1 (en) * 2017-07-07 2019-01-10 Microsoft Technology Licensing, Llc Internet of things blockchain interface
US20190058992A1 (en) * 2017-08-17 2019-02-21 Bank Of America Corporation Multifactor network authentication
US20190058702A1 (en) * 2017-08-17 2019-02-21 Bank Of America Corporation Self-adjusting multifactor network authentication
US20190109839A1 (en) * 2017-10-06 2019-04-11 Bank Of America Corporation Multi-level authentication system with persistent integration platform
US20190199813A1 (en) * 2017-12-22 2019-06-27 CircleIt LLC Method and system for scheduling, indexing, categorizing, and triggering digital content and gifts for future delivery
US20190251765A1 (en) * 2015-08-11 2019-08-15 Schweitzer Engineering Laboratories, Inc. Policy-managed physical access authentication
US20190272361A1 (en) * 2018-03-01 2019-09-05 Bank Of America Corporation System and method for continuous and competitive authentication
US20190281465A1 (en) * 2017-12-04 2019-09-12 Kevin K Moshir Blockchain for validating communications archiving
US20190311791A1 (en) * 2018-04-04 2019-10-10 Healthcard LLC System and method for patient-centric universal health recording and payment
US20190312871A1 (en) * 2016-05-18 2019-10-10 Salesforce.Com, Inc. Environment-differentiated named credential instances for development and deployment
US20190325154A1 (en) * 2019-06-28 2019-10-24 Sudeep Divakaran Hardware-assisted privacy protection using a secure user interface with multi-level access control of sensor data
US20190335002A1 (en) * 2018-04-26 2019-10-31 Verizon Patent And Licensing Inc. Programmable user plane function
US20190342298A1 (en) * 2018-05-02 2019-11-07 Samsung Electronics Co., Ltd. System and method for resource access authentication
US20190349469A1 (en) * 2018-05-08 2019-11-14 Apple Inc. Managing device usage
US20190378078A1 (en) * 2018-06-11 2019-12-12 Intyrn Inc Task delegation system
US20200004520A1 (en) * 2018-06-29 2020-01-02 Alibaba Group Holding Limited One Click Application Asset Distribution
US20200007530A1 (en) * 2018-06-28 2020-01-02 Oracle International Corporation Session Synchronization Across Multiple Devices in an Identity Cloud Service
US20200021591A1 (en) * 2018-07-11 2020-01-16 Cyberark Software Ltd. Automated creation of dynamic privileged access resources
US20200052882A1 (en) * 2018-08-10 2020-02-13 International Business Machines Corporation Secure environment device management
US20200074333A1 (en) * 2018-08-30 2020-03-05 Conduent Business Services, Llc Method and system for dynamic trust model for personalized recommendation system in shared and non-shared economy
US20200117442A1 (en) * 2018-10-10 2020-04-16 Digital Alert Systems, Inc. Method, system and program product for monitoring and managing emergency alert system devices
US20200145425A1 (en) 2018-11-07 2020-05-07 Citrix Systems, Inc. Systems and methods for continuous authentication
US10673862B1 (en) * 2016-12-07 2020-06-02 Amazon Technologies, Inc. Token-based access tracking and revocation
US20200196378A1 (en) * 2016-03-18 2020-06-18 Parallel Wireless, Inc. Base Station Grouping for Topology Hiding
US10693914B2 (en) * 2015-06-26 2020-06-23 Micro Focus Llc Alerts for communities of a security information sharing platform
US10701044B2 (en) * 2015-06-26 2020-06-30 Micro Focus Llc Sharing of community-based security information
US10771572B1 (en) * 2014-04-30 2020-09-08 Twitter, Inc. Method and system for implementing circle of trust in a social network
US20200322169A1 (en) * 2019-04-08 2020-10-08 Cisco Technology, Inc. Accountable identities on the internet
US20200322330A1 (en) 2019-04-08 2020-10-08 Cisco Technology, Inc. Continuous multi-factor authentication system
US20200322321A1 (en) * 2019-04-08 2020-10-08 Cisco Technology, Inc. Continuous trust score
US20200382323A1 (en) * 2019-06-03 2020-12-03 Intuit Inc. Centralized authentication and authorization with certificate management
US20200395107A1 (en) * 2019-06-11 2020-12-17 International Business Machines Corporation Secure environment device management
US20200412541A1 (en) * 2018-01-27 2020-12-31 Redrock Biometrics Inc Authentication ledger interactions for decentralized biometric authentication
US20210004454A1 (en) * 2019-07-07 2021-01-07 Apple Inc. Proof of affinity to a secure event for frictionless credential management
US20210036865A1 (en) * 2019-07-29 2021-02-04 International Business Machines Corporation Automatic form completion from a set of federated data providers
US10951606B1 (en) 2019-12-04 2021-03-16 Acceptto Corporation Continuous authentication through orchestration and risk calculation post-authorization system and method
US10963842B1 (en) * 2019-06-20 2021-03-30 Intuit Inc. Communication platform for email management
US20210124817A1 (en) * 2019-10-25 2021-04-29 EMC IP Holding Company LLC Human trust api in a data confidence fabric
US20210160261A1 (en) * 2019-11-21 2021-05-27 International Business Machines Corporation Device agnostic discovery and self-healing consensus network
US20210173910A1 (en) * 2019-12-06 2021-06-10 Bank Of America Corporation Thermally enriched multi-modal and multi-channel biometric authentication
US20210218732A1 (en) * 2020-01-09 2021-07-15 Bank Of America Corporation Client Side OTP Generation Method
US20210226944A1 (en) 2020-01-22 2021-07-22 Cisco Technology, Inc. Method to bind a user and its devices: context fusion
US11095662B2 (en) * 2017-08-29 2021-08-17 Amazon Technologies, Inc. Federated messaging
US20210306456A1 (en) * 2020-03-24 2021-09-30 Vamsee Dheeraj Kanagala Intelligent telephone call blocking and management
US20210377056A1 (en) * 2020-05-29 2021-12-02 Apple Inc. Secure sharing of credential information
US20210374709A1 (en) * 2020-05-29 2021-12-02 Apple Inc. Creation of restricted mobile accounts
US20210385202A1 (en) * 2020-06-04 2021-12-09 Caliola Engineering, LLC Secure wireless cooperative broadcast networks
US20210392048A1 (en) * 2020-06-12 2021-12-16 Strata Identity, Inc. Systems, methods, and storage media for controlling identity information across multiple identity domains in a distributed identity infrastructure
US20220014359A1 (en) * 2020-07-07 2022-01-13 Curity Ab Login and consent methodology that follows rest principles and uses the oauth protocol with attested clients
US20220012256A1 (en) * 2018-10-10 2022-01-13 Digital Alert Systems, Inc. Method, system and program product for monitoring eas devices
US20220067669A1 (en) * 2020-09-01 2022-03-03 International Business Machines Corporation Predictive device maintenance
US20220075695A1 (en) * 2020-09-09 2022-03-10 Thales Dis Usa, Inc Backup and recovery of private information on edge devices onto surrogate edge devices
US20220078194A1 (en) * 2020-09-08 2022-03-10 Micro Focus Llc Dynamic level authentication/encryption
US20220085984A1 (en) * 2020-09-14 2022-03-17 Amir Keyvan Khandani Methods and apparatus for randomized encryption, with an associated randomized decryption
US20220094722A1 (en) * 2020-09-24 2022-03-24 Avaya Management L.P. Methods and systems for maintaining conditional communication sessions using terminable authentication signals
US20220095116A1 (en) * 2020-09-22 2022-03-24 Apple Inc. Device communication through high-frequency light encoding
US20220103568A1 (en) * 2020-09-30 2022-03-31 Denso Corporation Authentication management method, authentication management program, and user authentication management device
US20220138692A1 (en) * 2020-10-29 2022-05-05 Medecision, Inc. System and method for virtual project visits
US20220150313A1 (en) * 2018-12-10 2022-05-12 Parallels International Gmbh System and method for remote application sharing
US20220166883A1 (en) * 2017-01-20 2022-05-26 Virtual Hold Technology Solutions, Llc System and method for enhanced virtual queuing
US20220210173A1 (en) 2020-12-31 2022-06-30 Fortinet, Inc. Contextual zero trust network access (ztna) based on dynamic security posture insights
US20220245222A1 (en) * 2021-02-04 2022-08-04 Dell Products L.P. Baseboard management controller firmware security system
US11412003B1 (en) * 2018-05-07 2022-08-09 Amrock, Llc Resource protection and verification with bidirectional notification architecture
US20220337631A1 (en) 2021-04-15 2022-10-20 Anamika Bhattacharya System and method to create zero trust framework for security as a service
US11483316B1 (en) * 2019-07-11 2022-10-25 Workday, Inc. System and method for access using a circle of trust
US20220360607A1 (en) * 2021-05-10 2022-11-10 Island Technology, Inc. Enterprise browser system
US20220398319A1 (en) * 2021-06-14 2022-12-15 Dell Products, L.P. Custom baseboard management controller (bmc) firmware stack monitoring system and method
US20220406304A1 (en) * 2021-06-21 2022-12-22 Kyndryl, Inc. Intent driven voice interface
US20230054446A1 (en) * 2013-11-01 2023-02-23 Anonos Ip Llc Systems and methods for functionally separating geospatial information for lawful and trustworthy analytics, artificial intelligence and machine learning
US20230170956A1 (en) * 2021-12-01 2023-06-01 Qualcomm Incorporated Secret key extraction for line-of-sight communications
US20230179605A1 (en) * 2021-12-03 2023-06-08 Whatsapp Llc Providing equal signing authority between multiple devices of a single user in an end-to-end encrypted messaging system
US20230222047A1 (en) * 2022-01-11 2023-07-13 International Business Machines Corporation Methods and systems for managing as-a-service systems in the event of connectivity issues
US20230237349A1 (en) 2011-03-04 2023-07-27 Digital Consolidation, Inc. Digital consolidation
US20230247003A1 (en) 2014-06-20 2023-08-03 Zscaler, Inc. Zero trust private application access for government applications
US20230244775A1 (en) * 2022-01-31 2023-08-03 Salesforce.Com, Inc. Verification of Automatic Responses to Authentication Requests on Authorized Mobile Devices
US20230251936A1 (en) * 2022-02-10 2023-08-10 Vinpower Inc. Mobile device for protecting data stored in data backup device and data protection method thereof
US11743256B1 (en) * 2019-11-05 2023-08-29 Shape Security, Inc. Security measures for extended sessions using multi-domain data
US20230300930A1 (en) * 2022-01-31 2023-09-21 Kyndryl, Inc. Cognitive hotspot provisioning and network prioritization
US20230306428A1 (en) * 2022-03-24 2023-09-28 Bank Of America Corporation Multi-Computer System with Dynamic Authentication for Optimized Queue Management Based on Facial Recognition
US20230336663A1 (en) * 2009-01-28 2023-10-19 Virtual Hold Technology Solutions, Llc System and method for secure transitory data storage and management
US20230379350A1 (en) 2022-05-20 2023-11-23 Cisco Technology, Inc. Continuous trusted access of endpoints
US20230379319A1 (en) * 2022-05-20 2023-11-23 Cisco Technology, Inc. Secure access service edge function with configured metric collection intelligence
US20230384996A1 (en) * 2022-05-31 2023-11-30 Sharp Kabushiki Kaisha Image forming apparatus and determination method in processing apparatus
US11838762B1 (en) 2019-08-04 2023-12-05 Secureauth Corporation Method and system for identity verification and authorization of request by checking against an active user directory of identity service entities selected by an identity information owner
US11886607B1 (en) * 2019-03-14 2024-01-30 Change Healthcare Holdings, Llc Apparatus and method configured to facilitate the selective search of a database
US20240040383A1 (en) 2022-07-29 2024-02-01 Cisco Technology, Inc. Trust based continuous 5g service assessment
US20240073251A1 (en) * 2022-08-25 2024-02-29 Capital One Services, Llc Authentication based on detection of user-specific authentication input errors
US11936671B1 (en) 2023-06-26 2024-03-19 Kolide, Inc. Zero trust architecture with browser-supported security posture data collection
US20240098097A1 (en) * 2015-12-22 2024-03-21 Mcafee, Llc Secure over-the-air updates
US20240098577A1 (en) * 2022-09-19 2024-03-21 Qualcomm Incorporated Techniques for connected state mobility in a service-based wireless system
US20240152857A1 (en) * 2022-11-04 2024-05-09 Project44, Llc Analyzing and Managing Shipping Data Across Jurisdictions and Regions
US11997219B1 (en) * 2019-02-25 2024-05-28 United Services Automobile Association (Usaa) Network security for remote workers
US20240243904A1 (en) * 2023-01-12 2024-07-18 nTropy.io, Inc. File construct for internet-of-things key material
US20240244068A1 (en) * 2015-10-28 2024-07-18 Qomplx Llc System and methods for detecting authentication object forgery or manipulation attacks
US20240273066A1 (en) * 2023-02-15 2024-08-15 Varonis Systems, Inc. Optimized file classification with supervised learning
US20240281796A1 (en) * 2023-02-17 2024-08-22 Artema Labs, Inc Systems and Methods for Facilitating Digital Wallet-Based Transactions
US20240314551A1 (en) * 2022-05-07 2024-09-19 Nokia Technologies Oy Security communication in prose u2n relay
US20240323034A1 (en) * 2023-03-24 2024-09-26 Srinivas Kumar System and method for extended attributes in certificates for dynamic authorization
US12130941B2 (en) * 2011-05-10 2024-10-29 Nagravision Sàrl Method for handling privacy data
US20240364730A1 (en) * 2023-04-25 2024-10-31 Ping Identity International, Inc. Access prediction service serving explainable risk scores
US20240378423A1 (en) * 2023-05-08 2024-11-14 ForgeRock, Inc. Explainable neural network for anomaly detection
US20240380575A1 (en) * 2023-05-09 2024-11-14 Apple Inc. Server-Mediated Management of Accessory Device Sharing
US20240414061A1 (en) * 2023-06-06 2024-12-12 Vmware, Inc. Conflict resolution between global and local network managers in a virtualized computing system
US12170669B2 (en) * 2018-12-11 2024-12-17 Visa International Service Association Trust tokens for resource access

Patent Citations (186)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7788700B1 (en) 2002-05-15 2010-08-31 Gerard A. Gagliano Enterprise security system
US20040111398A1 (en) * 2002-12-09 2004-06-10 International Business Machines Corporation Performance mechanism for presenting integrated information in a graphical user interface
US20050021964A1 (en) * 2003-07-25 2005-01-27 Bhavna Bhatnagar Method and system for providing a circle of trust on a network
US7836510B1 (en) * 2004-04-30 2010-11-16 Oracle America, Inc. Fine-grained attribute access control
US20070297405A1 (en) 2004-12-31 2007-12-27 Liwen He Method of Operating a Network
US7891001B1 (en) 2005-08-26 2011-02-15 Perimeter Internetworking Corporation Methods and apparatus providing security within a network
US20070136786A1 (en) * 2005-12-08 2007-06-14 Sun Microsystems, Inc. Enabling identity information exchange between circles of trust
US20070143128A1 (en) * 2005-12-20 2007-06-21 Tokarev Maxim L Method and system for providing customized recommendations to users
US20070180078A1 (en) * 2006-01-30 2007-08-02 Microsoft Corporation Automated File Distribution
US9077715B1 (en) * 2006-03-31 2015-07-07 Symantec Corporation Social trust based security model
US20130252585A1 (en) * 2006-05-25 2013-09-26 Sean Moshir Systems and methods for encrypted mobile voice communications
US20150072654A1 (en) * 2006-05-25 2015-03-12 Kevin K. Moshir Systems And Methods For Encrypted Mobile Voice Communications
US7788708B2 (en) * 2006-10-02 2010-08-31 Presenceid, Inc. Systems and methods for delegating information technology authorization to at least one other person
US20080083021A1 (en) * 2006-10-02 2008-04-03 Presenceid, Inc. Systems and methods for delegating information technology authorization to at least one other person
US20080092223A1 (en) * 2006-10-16 2008-04-17 Aruba Wireless Networks Per-user firewall
US20080130522A1 (en) * 2006-11-30 2008-06-05 Havoc Pennington Protocol for sharing information in a trusted circle using peer to peer methodology
US20080228775A1 (en) * 2007-03-15 2008-09-18 Fatdoor, Inc. Youth communities in a geo-spatial environment
US20080301779A1 (en) * 2007-05-31 2008-12-04 Neeraj Garg Configuring Security Mechanisms Utilizing A Trust System
US20090094041A1 (en) * 2007-10-09 2009-04-09 Novell, Inc. System and method for representing agreements as reputation
US20100071056A1 (en) * 2008-09-18 2010-03-18 Sun Microsystems, Inc. Method and system for multi-protocol single logout
US20100107219A1 (en) * 2008-10-29 2010-04-29 Microsoft Corporation Authentication - circles of trust
US20230336663A1 (en) * 2009-01-28 2023-10-19 Virtual Hold Technology Solutions, Llc System and method for secure transitory data storage and management
US20110072274A1 (en) * 2009-03-31 2011-03-24 Topaz Systems, Inc. Distributed system for multi-function secure verifiable signer authentication
US20100287600A1 (en) 2009-05-11 2010-11-11 International Business Machines Corporation Assigning User Requests of Different Types or Protocols to a User by Trust Association Interceptors
US20120042160A1 (en) * 2010-08-10 2012-02-16 General Instrument Corporation System and method for cognizant transport layer security (ctls)
US20120209970A1 (en) 2011-02-15 2012-08-16 Ebay Inc. Systems and methods for facilitating user confidence over a network
US20230237349A1 (en) 2011-03-04 2023-07-27 Digital Consolidation, Inc. Digital consolidation
US20120232945A1 (en) * 2011-03-10 2012-09-13 Hong Kong R&D Centre for Logistics and Supply Chain Management Enabling Technologies Lightweight privacy protection protocol, methods, and systems for rfid and sensor based logistics track and trace data sharing over business subcontracting relationships
US12130941B2 (en) * 2011-05-10 2024-10-29 Nagravision Sàrl Method for handling privacy data
US20120302212A1 (en) * 2011-05-25 2012-11-29 Critical Medical Solutions, Inc. Secure mobile radiology communication system
US20130086669A1 (en) * 2011-09-29 2013-04-04 Oracle International Corporation Mobile application, single sign-on management
US20130091582A1 (en) * 2011-10-08 2013-04-11 Broadcom Corporation Content security in a social network
US20130185772A1 (en) * 2012-01-12 2013-07-18 Aventura Hq, Inc. Dynamically updating a session based on location data from an authentication device
US20130191903A1 (en) * 2012-01-20 2013-07-25 Aventura Hq, Inc. Dual factor authentication with a programmable terminal device
US20130195026A1 (en) * 2012-01-27 2013-08-01 Kerstin Johnsson Centralized control of intra-cell device-to-device communication
US20150207813A1 (en) * 2012-02-01 2015-07-23 Vorstack, Inc. Techniques for sharing network security event information
US20130205373A1 (en) * 2012-02-08 2013-08-08 Aventura Hq, Inc. Adapting authentication flow based on workflow events
US8925053B1 (en) 2012-02-24 2014-12-30 Emc Corporation Internet-accessible service for dynamic authentication and continuous assertion of trust level in identities
US20130232543A1 (en) * 2012-03-02 2013-09-05 International Business Machines Corporation System and method to provide server control for access to mobile client data
US20130311582A1 (en) * 2012-05-18 2013-11-21 University Of Florida Research Foundation, Incorporated Maximizing circle of trust in online social networks
US20130332257A1 (en) * 2012-06-08 2013-12-12 Adobe Systems Incorporated Sharing private devices for content rendering
US8832848B1 (en) * 2012-07-26 2014-09-09 Symantec Corporation Systems and methods for content-aware access control
US20140136349A1 (en) * 2012-11-13 2014-05-15 Apple Inc. Transferring assets
US20140143826A1 (en) * 2012-11-21 2014-05-22 Apple Inc. Policy-based techniques for managing access control
US20140164305A1 (en) * 2012-12-11 2014-06-12 Nuance Communications, Inc. Systems and methods for virtual agent recommendation for multiple persons
US20140282942A1 (en) * 2013-03-15 2014-09-18 Omer BERKMAN Privacy preserving knowledge and factor possession tests for persistent authentication
US20140289528A1 (en) * 2013-03-22 2014-09-25 Davit Baghdasaryan System and method for privacy-enhanced data synchronization
US20160135020A1 (en) * 2013-05-20 2016-05-12 Celltrust Corporation System and method for tracking sms messages
US20140359789A1 (en) * 2013-05-30 2014-12-04 Telecommunication Systems, Inc. Trusted Circle Information Access Management User Interface
US20150082396A1 (en) * 2013-09-19 2015-03-19 Oracle International Corporation Privileged account plug-in framework - network - connected objects
US20160028737A1 (en) * 2013-09-20 2016-01-28 Oracle International Corporation Multiple resource servers interacting with single oauth server
US20230054446A1 (en) * 2013-11-01 2023-02-23 Anonos Ip Llc Systems and methods for functionally separating geospatial information for lawful and trustworthy analytics, artificial intelligence and machine learning
US20160156609A1 (en) * 2014-02-07 2016-06-02 Bank Of America Corporation Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements
US20150227727A1 (en) * 2014-02-07 2015-08-13 Bank Of America Corporation Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location
US20150227728A1 (en) * 2014-02-07 2015-08-13 Bank Of America Corporation Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements
US10771572B1 (en) * 2014-04-30 2020-09-08 Twitter, Inc. Method and system for implementing circle of trust in a social network
US9213855B1 (en) * 2014-06-02 2015-12-15 Narus, Inc. Trusted user circles
US20230247003A1 (en) 2014-06-20 2023-08-03 Zscaler, Inc. Zero trust private application access for government applications
US20160013966A1 (en) * 2014-07-11 2016-01-14 Microsoft Technology Licensing, Llc Device Circles
US20160055324A1 (en) * 2014-08-20 2016-02-25 Motorola Mobility Llc Context-Based Authentication Mode Selection
US9608964B2 (en) * 2015-02-23 2017-03-28 PrivApp, Inc. Private application platform
US10110569B1 (en) * 2015-04-08 2018-10-23 CSuite Technologies, Inc. Systems and methods of storing data on a cloud-based personal virtual server
US20180077745A1 (en) * 2015-04-15 2018-03-15 Nec Corporation Method for coordinating terminal-to-terminal communication via ad-hoc network and mobile communication network, and management server device in which said method is implemented
US20160373352A1 (en) * 2015-06-17 2016-12-22 Brocade Communications Systems, Inc. Configuration of load-sharing components of a network visibility router in a network visibility system
US20160373932A1 (en) * 2015-06-19 2016-12-22 Apple Inc. Electronic subscriber identity module management under multiple certificate authorities
US10701044B2 (en) * 2015-06-26 2020-06-30 Micro Focus Llc Sharing of community-based security information
US10693914B2 (en) * 2015-06-26 2020-06-23 Micro Focus Llc Alerts for communities of a security information sharing platform
US20190251765A1 (en) * 2015-08-11 2019-08-15 Schweitzer Engineering Laboratories, Inc. Policy-managed physical access authentication
US20170093829A1 (en) * 2015-09-25 2017-03-30 Mcafee, Inc. Cumulative authentication for step-up increased authentication factors
US20170093899A1 (en) * 2015-09-29 2017-03-30 International Business Machines Corporation Crowd-based detection of device compromise in enterprise setting
US20170111364A1 (en) * 2015-10-14 2017-04-20 Uber Technologies, Inc. Determining fraudulent user accounts using contact information
US20240244068A1 (en) * 2015-10-28 2024-07-18 Qomplx Llc System and methods for detecting authentication object forgery or manipulation attacks
US20170124506A1 (en) * 2015-10-30 2017-05-04 Zemcar, Inc. Rules Based Driver Selection
US20170171231A1 (en) * 2015-12-11 2017-06-15 Brightpoint Security, Inc. Computer Network Threat Assessment
US20240098097A1 (en) * 2015-12-22 2024-03-21 Mcafee, Llc Secure over-the-air updates
US20180278600A1 (en) * 2016-01-19 2018-09-27 Regwez, Inc. Multi-factor masked access control system
US20200196378A1 (en) * 2016-03-18 2020-06-18 Parallel Wireless, Inc. Base Station Grouping for Topology Hiding
US20170331826A1 (en) * 2016-05-11 2017-11-16 International Business Machines Corporation Hybrid database access control in external-to-database security systems
US20190312871A1 (en) * 2016-05-18 2019-10-10 Salesforce.Com, Inc. Environment-differentiated named credential instances for development and deployment
US20170346823A1 (en) * 2016-05-25 2017-11-30 Bank Of America Corporation Network of trusted users
US20180012433A1 (en) * 2016-07-07 2018-01-11 NextEv USA, Inc. Vehicle identification or authentication
WO2018069566A1 (en) * 2016-10-14 2018-04-19 Nokia Technologies Oy Method, device and system for validating sensitive user data transactions within trusted circle
US20180121646A1 (en) * 2016-11-01 2018-05-03 Ricoh Company, Ltd. Information processing device, information processing system, and information processing method
US20180131692A1 (en) * 2016-11-09 2018-05-10 Idefend Ltd. System and a method for applying dynamically configurable means of user authentication
US20180129797A1 (en) * 2016-11-10 2018-05-10 EyeVerify Inc. Verified and private portable identity
US20180150890A1 (en) * 2016-11-28 2018-05-31 Sap Se Trust circle through machine learning
US10673862B1 (en) * 2016-12-07 2020-06-02 Amazon Technologies, Inc. Token-based access tracking and revocation
US20180191501A1 (en) * 2016-12-31 2018-07-05 Nok Nok Labs, Inc. System and method for sharing keys across authenticators
US20220166883A1 (en) * 2017-01-20 2022-05-26 Virtual Hold Technology Solutions, Llc System and method for enhanced virtual queuing
US20180309570A1 (en) 2017-04-21 2018-10-25 Netgear, Inc. Secure communication in network access points
US20180324197A1 (en) * 2017-05-03 2018-11-08 Servicenow, Inc. Aggregating network security data for export
US20180324207A1 (en) * 2017-05-05 2018-11-08 Servicenow, Inc. Network security threat intelligence sharing
US20180332065A1 (en) * 2017-05-11 2018-11-15 International Business Machines Corporation Authenticating an unknown device based on relationships with other devices in a group of devices
US20180332017A1 (en) * 2017-05-11 2018-11-15 International Business Machines Corporation Authenticating a device based on communication patterns in a group of devices
US20180337911A1 (en) * 2017-05-16 2018-11-22 Apple Inc. Techniques for verifying user intent and securely configuring computing devices
US20190013948A1 (en) * 2017-07-07 2019-01-10 Microsoft Technology Licensing, Llc Internet of things blockchain interface
US20190058992A1 (en) * 2017-08-17 2019-02-21 Bank Of America Corporation Multifactor network authentication
US20190058702A1 (en) * 2017-08-17 2019-02-21 Bank Of America Corporation Self-adjusting multifactor network authentication
US11095662B2 (en) * 2017-08-29 2021-08-17 Amazon Technologies, Inc. Federated messaging
US20190109839A1 (en) * 2017-10-06 2019-04-11 Bank Of America Corporation Multi-level authentication system with persistent integration platform
US10164982B1 (en) * 2017-11-28 2018-12-25 Cyberark Software Ltd. Actively identifying and neutralizing network hot spots
US20190281465A1 (en) * 2017-12-04 2019-09-12 Kevin K Moshir Blockchain for validating communications archiving
US20190199813A1 (en) * 2017-12-22 2019-06-27 CircleIt LLC Method and system for scheduling, indexing, categorizing, and triggering digital content and gifts for future delivery
US20200412541A1 (en) * 2018-01-27 2020-12-31 Redrock Biometrics Inc Authentication ledger interactions for decentralized biometric authentication
US20190272361A1 (en) * 2018-03-01 2019-09-05 Bank Of America Corporation System and method for continuous and competitive authentication
US20190311791A1 (en) * 2018-04-04 2019-10-10 Healthcard LLC System and method for patient-centric universal health recording and payment
US20190335002A1 (en) * 2018-04-26 2019-10-31 Verizon Patent And Licensing Inc. Programmable user plane function
US20190342298A1 (en) * 2018-05-02 2019-11-07 Samsung Electronics Co., Ltd. System and method for resource access authentication
US11412003B1 (en) * 2018-05-07 2022-08-09 Amrock, Llc Resource protection and verification with bidirectional notification architecture
US20190349469A1 (en) * 2018-05-08 2019-11-14 Apple Inc. Managing device usage
US20190378078A1 (en) * 2018-06-11 2019-12-12 Intyrn Inc Task delegation system
US20200007530A1 (en) * 2018-06-28 2020-01-02 Oracle International Corporation Session Synchronization Across Multiple Devices in an Identity Cloud Service
US20200004520A1 (en) * 2018-06-29 2020-01-02 Alibaba Group Holding Limited One Click Application Asset Distribution
US20200021591A1 (en) * 2018-07-11 2020-01-16 Cyberark Software Ltd. Automated creation of dynamic privileged access resources
US20200052882A1 (en) * 2018-08-10 2020-02-13 International Business Machines Corporation Secure environment device management
US20200074333A1 (en) * 2018-08-30 2020-03-05 Conduent Business Services, Llc Method and system for dynamic trust model for personalized recommendation system in shared and non-shared economy
US20200117442A1 (en) * 2018-10-10 2020-04-16 Digital Alert Systems, Inc. Method, system and program product for monitoring and managing emergency alert system devices
US20220012256A1 (en) * 2018-10-10 2022-01-13 Digital Alert Systems, Inc. Method, system and program product for monitoring eas devices
US20200145425A1 (en) 2018-11-07 2020-05-07 Citrix Systems, Inc. Systems and methods for continuous authentication
US20220150313A1 (en) * 2018-12-10 2022-05-12 Parallels International Gmbh System and method for remote application sharing
US12170669B2 (en) * 2018-12-11 2024-12-17 Visa International Service Association Trust tokens for resource access
US11997219B1 (en) * 2019-02-25 2024-05-28 United Services Automobile Association (Usaa) Network security for remote workers
US11886607B1 (en) * 2019-03-14 2024-01-30 Change Healthcare Holdings, Llc Apparatus and method configured to facilitate the selective search of a database
US20200322321A1 (en) * 2019-04-08 2020-10-08 Cisco Technology, Inc. Continuous trust score
US20200322330A1 (en) 2019-04-08 2020-10-08 Cisco Technology, Inc. Continuous multi-factor authentication system
US20200322169A1 (en) * 2019-04-08 2020-10-08 Cisco Technology, Inc. Accountable identities on the internet
US20200382323A1 (en) * 2019-06-03 2020-12-03 Intuit Inc. Centralized authentication and authorization with certificate management
US20200395107A1 (en) * 2019-06-11 2020-12-17 International Business Machines Corporation Secure environment device management
US10963842B1 (en) * 2019-06-20 2021-03-30 Intuit Inc. Communication platform for email management
US20190325154A1 (en) * 2019-06-28 2019-10-24 Sudeep Divakaran Hardware-assisted privacy protection using a secure user interface with multi-level access control of sensor data
US20210004454A1 (en) * 2019-07-07 2021-01-07 Apple Inc. Proof of affinity to a secure event for frictionless credential management
US11483316B1 (en) * 2019-07-11 2022-10-25 Workday, Inc. System and method for access using a circle of trust
US11539533B1 (en) * 2019-07-11 2022-12-27 Workday, Inc. Access control using a circle of trust
US20210036865A1 (en) * 2019-07-29 2021-02-04 International Business Machines Corporation Automatic form completion from a set of federated data providers
US11838762B1 (en) 2019-08-04 2023-12-05 Secureauth Corporation Method and system for identity verification and authorization of request by checking against an active user directory of identity service entities selected by an identity information owner
US20210124817A1 (en) * 2019-10-25 2021-04-29 EMC IP Holding Company LLC Human trust api in a data confidence fabric
US11743256B1 (en) * 2019-11-05 2023-08-29 Shape Security, Inc. Security measures for extended sessions using multi-domain data
US20210160261A1 (en) * 2019-11-21 2021-05-27 International Business Machines Corporation Device agnostic discovery and self-healing consensus network
US10951606B1 (en) 2019-12-04 2021-03-16 Acceptto Corporation Continuous authentication through orchestration and risk calculation post-authorization system and method
US20210173910A1 (en) * 2019-12-06 2021-06-10 Bank Of America Corporation Thermally enriched multi-modal and multi-channel biometric authentication
US20210218732A1 (en) * 2020-01-09 2021-07-15 Bank Of America Corporation Client Side OTP Generation Method
US20210226944A1 (en) 2020-01-22 2021-07-22 Cisco Technology, Inc. Method to bind a user and its devices: context fusion
US20210306456A1 (en) * 2020-03-24 2021-09-30 Vamsee Dheeraj Kanagala Intelligent telephone call blocking and management
US20210374709A1 (en) * 2020-05-29 2021-12-02 Apple Inc. Creation of restricted mobile accounts
US20210377056A1 (en) * 2020-05-29 2021-12-02 Apple Inc. Secure sharing of credential information
US20210385202A1 (en) * 2020-06-04 2021-12-09 Caliola Engineering, LLC Secure wireless cooperative broadcast networks
US20210392048A1 (en) * 2020-06-12 2021-12-16 Strata Identity, Inc. Systems, methods, and storage media for controlling identity information across multiple identity domains in a distributed identity infrastructure
US20220014359A1 (en) * 2020-07-07 2022-01-13 Curity Ab Login and consent methodology that follows rest principles and uses the oauth protocol with attested clients
US20220067669A1 (en) * 2020-09-01 2022-03-03 International Business Machines Corporation Predictive device maintenance
US20220078194A1 (en) * 2020-09-08 2022-03-10 Micro Focus Llc Dynamic level authentication/encryption
US20220075695A1 (en) * 2020-09-09 2022-03-10 Thales Dis Usa, Inc Backup and recovery of private information on edge devices onto surrogate edge devices
US20220085984A1 (en) * 2020-09-14 2022-03-17 Amir Keyvan Khandani Methods and apparatus for randomized encryption, with an associated randomized decryption
US20220095116A1 (en) * 2020-09-22 2022-03-24 Apple Inc. Device communication through high-frequency light encoding
US20220094722A1 (en) * 2020-09-24 2022-03-24 Avaya Management L.P. Methods and systems for maintaining conditional communication sessions using terminable authentication signals
US20220103568A1 (en) * 2020-09-30 2022-03-31 Denso Corporation Authentication management method, authentication management program, and user authentication management device
US20220138692A1 (en) * 2020-10-29 2022-05-05 Medecision, Inc. System and method for virtual project visits
US20220210173A1 (en) 2020-12-31 2022-06-30 Fortinet, Inc. Contextual zero trust network access (ztna) based on dynamic security posture insights
US20220245222A1 (en) * 2021-02-04 2022-08-04 Dell Products L.P. Baseboard management controller firmware security system
US20220337631A1 (en) 2021-04-15 2022-10-20 Anamika Bhattacharya System and method to create zero trust framework for security as a service
US20220360607A1 (en) * 2021-05-10 2022-11-10 Island Technology, Inc. Enterprise browser system
US20220398319A1 (en) * 2021-06-14 2022-12-15 Dell Products, L.P. Custom baseboard management controller (bmc) firmware stack monitoring system and method
US20220406304A1 (en) * 2021-06-21 2022-12-22 Kyndryl, Inc. Intent driven voice interface
US20230170956A1 (en) * 2021-12-01 2023-06-01 Qualcomm Incorporated Secret key extraction for line-of-sight communications
US20230179605A1 (en) * 2021-12-03 2023-06-08 Whatsapp Llc Providing equal signing authority between multiple devices of a single user in an end-to-end encrypted messaging system
US20230222047A1 (en) * 2022-01-11 2023-07-13 International Business Machines Corporation Methods and systems for managing as-a-service systems in the event of connectivity issues
US20230244775A1 (en) * 2022-01-31 2023-08-03 Salesforce.Com, Inc. Verification of Automatic Responses to Authentication Requests on Authorized Mobile Devices
US20230300930A1 (en) * 2022-01-31 2023-09-21 Kyndryl, Inc. Cognitive hotspot provisioning and network prioritization
US20230251936A1 (en) * 2022-02-10 2023-08-10 Vinpower Inc. Mobile device for protecting data stored in data backup device and data protection method thereof
US20230306428A1 (en) * 2022-03-24 2023-09-28 Bank Of America Corporation Multi-Computer System with Dynamic Authentication for Optimized Queue Management Based on Facial Recognition
US20240314551A1 (en) * 2022-05-07 2024-09-19 Nokia Technologies Oy Security communication in prose u2n relay
US20230379319A1 (en) * 2022-05-20 2023-11-23 Cisco Technology, Inc. Secure access service edge function with configured metric collection intelligence
US20230379350A1 (en) 2022-05-20 2023-11-23 Cisco Technology, Inc. Continuous trusted access of endpoints
US20230384996A1 (en) * 2022-05-31 2023-11-30 Sharp Kabushiki Kaisha Image forming apparatus and determination method in processing apparatus
US20240040383A1 (en) 2022-07-29 2024-02-01 Cisco Technology, Inc. Trust based continuous 5g service assessment
US20240073251A1 (en) * 2022-08-25 2024-02-29 Capital One Services, Llc Authentication based on detection of user-specific authentication input errors
US20240098577A1 (en) * 2022-09-19 2024-03-21 Qualcomm Incorporated Techniques for connected state mobility in a service-based wireless system
US20240152857A1 (en) * 2022-11-04 2024-05-09 Project44, Llc Analyzing and Managing Shipping Data Across Jurisdictions and Regions
US20240243904A1 (en) * 2023-01-12 2024-07-18 nTropy.io, Inc. File construct for internet-of-things key material
US20240273066A1 (en) * 2023-02-15 2024-08-15 Varonis Systems, Inc. Optimized file classification with supervised learning
US20240281796A1 (en) * 2023-02-17 2024-08-22 Artema Labs, Inc Systems and Methods for Facilitating Digital Wallet-Based Transactions
US20240323034A1 (en) * 2023-03-24 2024-09-26 Srinivas Kumar System and method for extended attributes in certificates for dynamic authorization
US20240364730A1 (en) * 2023-04-25 2024-10-31 Ping Identity International, Inc. Access prediction service serving explainable risk scores
US20240378423A1 (en) * 2023-05-08 2024-11-14 ForgeRock, Inc. Explainable neural network for anomaly detection
US20240380575A1 (en) * 2023-05-09 2024-11-14 Apple Inc. Server-Mediated Management of Accessory Device Sharing
US20240414061A1 (en) * 2023-06-06 2024-12-12 Vmware, Inc. Conflict resolution between global and local network managers in a virtualized computing system
US11936671B1 (en) 2023-06-26 2024-03-19 Kolide, Inc. Zero trust architecture with browser-supported security posture data collection

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2026015803A1 (en) * 2024-07-12 2026-01-15 Cortwo Corp. Continuous universal trust architecture and method

Similar Documents

Publication Publication Date Title
US12316672B2 (en) Bot detection in an edge network using transport layer security (TLS) fingerprint
US11558484B2 (en) Systems and methods for secure peer-to-peer caching
EP3742289B1 (en) Virtual delivery appliance with remote authentication and related methods
US9531714B2 (en) Enterprise authentication via third party authentication support
US20200004946A1 (en) Secretless and secure authentication of network resources
US9860249B2 (en) System and method for secure proxy-based authentication
US10230725B2 (en) Edge protection for internal identity providers
US11831646B2 (en) Authentication for secure file sharing
US9497197B2 (en) Systems and methods for secure resource access and network communication
CN104253812B (en) Entrust the certification for WEB service
US8832857B2 (en) Unsecured asset detection via correlated authentication anomalies
US9813421B2 (en) Systems and methods for secure resource access and network communication
US10243953B2 (en) Systems and methods for secure resource access and network communication
US12101319B2 (en) Computing session multi-factor authentication
JP2014529272A5 (en)
US12341776B2 (en) Service to service communication and authentication via a central network mesh
US10897458B1 (en) Enhancing secure client experience through selective encryption of cookies
US12309132B1 (en) Continuous universal trust architecture and method
US10341345B1 (en) Network browser configuration
US20260019409A1 (en) Continuous universal trust architecture and method
US20240275819A1 (en) Secure system for hiding registration rules for dynamic client registration

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE